Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Microsoft, CrowdStrike Lead Effort to Map Threat Actor Names

Posted on June 3, 2025June 3, 2025 By CWS

Microsoft and CrowdStrike introduced on Monday that they’re main an business effort to map risk actor naming, with the aim of creating it simpler for the cybersecurity neighborhood to align intelligence.

There are lots of of various risk teams and so they can every have dozens of names assigned to them by the researchers and cybersecurity firms that analyze their actions. 

For example, the China-linked group also known as APT41 can also be tracked as Bronze Atlas, Earth Baku, Depraved Panda and Winnti, amongst others. The Russia-linked APT28 has not less than a dozen different names, together with Fancy Bear, Forest Blizzard, Sednit, Sofacy, and Tsar Staff.

Microsoft has been utilizing a weather-themed naming taxonomy (eg, Blizzard for Russia, Hurricane for China). CrowdStrike has been utilizing an animal-themed naming conference (eg, Panda for China, Bear for Russia, and Spider for cybercriminals). Google Cloud’s Mandiant is understood for utilizing the APT[number] and UNC[number] format.

At this level, getting all the cybersecurity business to make use of a single title for every risk group isn’t sensible and is probably not attainable, CrowdStrike famous, nevertheless it’s vital to convey readability to risk attribution throughout distributors.

As a part of the brand new initiative, Microsoft-assigned names are being mapped to different names assigned to the identical risk actor by CrowdStrike and different distributors.

“The alliance will assist the business higher correlate risk actor aliases with out imposing a single naming customary. It can develop sooner or later to incorporate different organizations that additionally follow the artwork of attribution,” CrowdStrike defined. 

“The aim: Deconflicting adversary names to construct a cohesive and enduring mapping of current naming methods to at least one one other. As well as, the place telemetry enhances each other, there’s a possibility to increase attribution throughout extra planes and vectors — constructing a richer, extra correct view of adversary campaigns that advantages all the neighborhood,” it added.

Microsoft identified that the initiative ought to assist enhance confidence in risk group identification, streamline correlation, and speed up defender motion.Commercial. Scroll to proceed studying.

“This effort isn’t about making a single naming customary,” Microsoft mentioned. “Slightly, it’s meant to assist our prospects and the broader safety neighborhood align intelligence extra simply, reply quicker, and keep forward of risk actors.”  

The tech large identified that Google (Mandiant) and Palo Alto Networks may also contribute to the mission.

It’s price noting that the Malpedia web site maintained by Germany’s Fraunhofer Institute for Communication, Info Processing and Ergonomics has been doing a great job over the previous years at holding monitor of the totally different names assigned to every risk group, together with the malware households they use. 

Nonetheless, the business may gain advantage much more from a concerted effort supported by the immense assets of firms equivalent to Microsoft, Google, CrowdStrike, and Palo Alto Networks.

Associated: Chinese language Hacking Group APT41 Exploits Google Calendar to Goal Governments

Associated: Russian APT Exploiting Mail Servers In opposition to Authorities, Protection Organizations

Associated: Ransomware Teams, Chinese language APTs Exploit Latest SAP NetWeaver Flaws

Security Week News Tags:Actor, CrowdStrike, Effort, Lead, Map, Microsoft, Names, Threat

Post navigation

Previous Post: Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues
Next Post: Google Researchers Find New Chrome Zero-Day

Related Posts

Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
Chipmaker Patch Tuesday: Intel, AMD, Arm Respond to New CPU Attacks Security Week News
Sharing Intelligence Beyond CTI Teams, Across Wider Functions and Departments Security Week News
Google DeepMind Unveils Defense Against Indirect Prompt Injection Attacks Security Week News
Destructive ‘PathWiper’ Targeting Ukraine’s Critical Infrastructure Security Week News
Marks & Spencer Says Data Stolen in Ransomware Attack Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • June 2025
  • May 2025

Recent Posts

  • Empower Users and Protect Against GenAI Data Loss
  • Cybersecurity M&A Roundup: 42 Deals Announced in May 2025
  • US to Offer $10 Million Reward for Details About RedLine Malware Developer
  • MIND Raises $30 Million for Data Loss Prevention
  • Why More Security Leaders Are Selecting AEV

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News