In cybersecurity, understanding an adversary’s identity, capabilities, and intent is critical to intelligent cyber defense. Attribution matters. Despite cyber threat intelligence tracking a multitude of threat actors for many decades, accurately attributing malicious activity continues to be difficult. Vendors and researchers often see different parts of the same puzzle — or entirely different puzzles — due to differences in telemetry. Organizations also have different standards and analytic maturity, which results in varying levels of visibility into threat activity and divergent perspectives on what’s being tracked.
Cybersecurity leaders, executive teams, and boards increasingly seek clear answers: Who is targeting us? How are they doing it? And why? To deliver those answers, attribution must be clearer, faster, and more consistent.
As cybersecurity becomes increasingly central to business resilience and national security, the challenge of adversary attribution has grown more urgent. Over the past several decades, multiple naming systems have emerged — each shaped by the unique vantage points of vendors and researchers. While these systems offer valuable insights, they’ve also created fragmentation, confusion, and complexity.
While a single universal naming standard is not practical and may not be possible, defenders shouldn’t have to spend countless cycles trying to delineate if COZY BEAR is the same as APT29, or UNC2452, or Midnight Blizzard.
We believe the industry must do better and we’re taking the lead with our partners to make that happen.
Bringing Clarity to Cyber Threat Attribution Across Vendors
Today, CrowdStrike and Microsoft announced a strategic alliance to bring clarity and coordination to the way organizations label threat actor groups. This strategic collaboration represents the efforts of two organizations to put the customer first, because good versus evil is the true fight. Together, we chose to prioritize the good fight to help make the world more secure.
The alliance will help the industry better correlate threat actor aliases without imposing a single naming standard. It will grow in the future to include other organizations that also practice the art of attribution.
The goal: deconflicting adversary names to build a cohesive and enduring mapping of existing naming systems to one another. In addition, where telemetry complements one another, there's an opportunity to extend attribution across more planes and vectors — building a richer, more accurate view of adversary campaigns that benefits the entire community.
How We’ll Get There
CrowdStrike and Microsoft are proud to take the first step, but we know this must be a community-led initiative to succeed. Together, the companies have already deconflicted more than 80 threat actors through direct, analyst-led collaboration. These represent some of the most active and sophisticated adversaries in the world.
Below is a sample of the adversaries we’ve deconflicted to date, but this is just the beginning. We look forward to expanding this work and inviting trusted contributors to join us, maintaining the mapping as adversaries evolve, and delivering clarity that empowers defenders at every level.