threatintel
actor tracker
intel sources · 39 entries

Where this intelligence comes from

A curated reading list — vendor research, government advisories, academic groups, and threat feeds that drive the rest of this site. Operator infrastructure (leak sites, hacktivist Telegram channels) is included as metadata only: you can see that it exists and which actor it belongs to, but the page deliberately does not render those rows as clickable links.

Vendor blog · 13

Check Point Research

research.checkpoint.com

Israeli vendor research with consistent Iran and Hezbollah-adjacent coverage; also strong on mobile-malware ecosystems.

lang: encovers: apt35, muddywater, apt33, apt34

Cisco Talos Intelligence Group

blog.talosintelligence.com

Telemetry-rich technical writeups; particularly strong on ransomware affiliate tracking and exploited-CVE post-mortems drawn from Cisco Secure Endpoint and Umbrella telemetry.

lang: en

CrowdStrike Blog

crowdstrike.com

Introduced the animal-suffix taxonomy (Cozy Bear, Fancy Bear, Wicked Panda). Annual Global Threat Report is a CTI staple. Heavy presence on eCrime tradecraft and access broker tracking.

lang: encovers: scattered-spider, apt29, apt28

ICS/OT-focused threat intelligence — the authoritative source on adversary tradecraft against industrial control systems. Their ELECTRUM/CHERNOVITE/VOLTZITE naming covers ICS-targeting groups.

lang: encovers: sandworm, volt-typhoon, cyber-avengers

ESET WeLiveSecurity

welivesecurity.com

Slovak vendor with deep reverse-engineering coverage of Industroyer, the GreyEnergy/BlackEnergy lineage, and Ukrainian-targeted destructive malware.

lang: encovers: sandworm, turla

Kaspersky Securelist

securelist.com

Long-running APT research; historically uncovered Equation Group, Duqu, and many post-Soviet-region intrusion sets. Reporting now viewed through a geopolitical lens but the technical depth on implant analysis remains valuable.

lang: en·ru

Mandiant (Google Cloud) Blog

cloud.google.com

Long-form intrusion writeups and APT attribution from the firm behind the original APT1 report (2013). Authoritative on China-nexus and Iran-nexus tracking; introduced the 'APTn' and 'UNCn' naming schemes the rest of the industry adopted.

lang: encovers: apt29, apt28, apt40, apt41, …

Microsoft Threat Intelligence

microsoft.com

Output from MSTIC (Microsoft Threat Intelligence Center) and the Digital Crimes Unit. Owns the weather-themed naming taxonomy (Volt Typhoon, Midnight Blizzard, Forest Blizzard). Strong on identity-provider abuse, BEC, and cloud-native intrusion.

lang: encovers: volt-typhoon, salt-typhoon, apt29, apt28

Palo Alto Networks · Unit 42

unit42.paloaltonetworks.com

Telemetry-driven research from Palo Alto Networks. Routinely publishes detailed actor profiles and IR narratives; strong Middle-East-nexus coverage.

lang: en

Recorded Future · Insikt Group

recordedfuture.com

Strategic CTI with strong influence-operations and infrastructure-tracking coverage. Notable for sustained tracking of Chinese MSS contractors and Russian disinformation ecosystem.

lang: encovers: apt40, apt41, salt-typhoon

SentinelLabs

sentinelone.com

SentinelOne's research arm. Strong reverse-engineering depth on macOS-targeting threats, North Korean tooling, and Russian destructive-malware families.

lang: encovers: lazarus-group, andariel, sandworm

Trend Micro Research

trendmicro.com

Broad telemetry from Asia-Pacific deployments. Often first with Chinese and Southeast-Asian threat-actor reporting (Earth-prefix naming taxonomy).

lang: en·jacovers: mustang-panda, apt40, apt41

Boutique IR firm with disproportionate influence on zero-day discovery (Microsoft Exchange ProxyShell, Ivanti Connect Secure). Reports tend to land first on novel state-sponsored exploitation.

lang: en

Government advisory · 7

ANSSI (France) CERT-FR

cert.ssi.gouv.fr

French national agency. Strong on EU diplomatic targeting and Russian-linked intrusion-set tracking; bilingual reports.

lang: fr·encountries: FR

BSI (Germany) Cyber-Sicherheitswarnungen

bsi.bund.de

Germany's federal cyber agency. Strong on industrial-base targeting and EU-coordinated advisory work.

lang: de·encountries: DE

State Cyber Protection Centre of Ukraine. Operational front line: routinely first to publish on Sandworm/APT28 destructive and disruptive operations.

lang: uk·encountries: UA

CISA Cybersecurity Advisories

cisa.gov

U.S. CISA's joint-advisory series (AAxx-NNNa) — typically co-signed with FBI/NSA and partner Five Eyes / EU agencies. The single most important defender-facing source on named-actor tradecraft and IOCs.

lang: encountries: US

JPCERT/CC

jpcert.or.jp

Japanese national CERT. Frequently first-to-publish on China-and DPRK-nexus campaigns targeting Asia-Pacific organizations; translates significant reports to English.

lang: ja·encountries: JP

KrCERT/CC (KISA)

krcert.or.kr

South Korea's national CERT under KISA. Authoritative on DPRK tradecraft against Korean targets.

lang: ko·encountries: KR

UK NCSC Threat Reports

ncsc.gov.uk

UK National Cyber Security Centre. Formal attribution carries intelligence-community weight; co-signs many CISA joint advisories.

lang: encountries: GB

Researcher · 3

The DFIR Report

thedfirreport.com

Detailed end-to-end intrusion narratives reconstructed from real engagements. Ideal for detection engineers — every report ends with an IOC pack and Sigma rule references.

lang: en

ThreatDown by Malwarebytes

threatdown.com

Consumer-facing but technically rigorous; strong ransomware and stealer-malware coverage.

lang: en

vx-underground

vx-underground.org

Independent malware-archive project; mirrors leak-site dumps and ransomware brand portals as research artifacts. Frequent first-publisher of leaked operator chats and source code.

lang: en

Academic / policy · 3

Atlantic Council DFRLab

atlanticcouncil.org

Influence-operations-focused research; strong on the intersection of cyber and information operations from Russia, China, and Iran.

lang: en

Citizen Lab

citizenlab.ca

University of Toronto research lab — definitive coverage of mercenary spyware (NSO Group/Pegasus, Candiru, QuaDream) and state-sponsored targeting of journalists and dissidents.

lang: en

CSIS · Strategic Technologies Program

csis.org

Maintains the Significant Cyber Incidents list — high-signal running chronology of state-attributed events going back to 2006.

lang: en

Podcast / news · 3

BleepingComputer

bleepingcomputer.com

Beat-reporter cybersecurity news. Often the public confirmation channel for ransomware victim disclosures and brand-new strain discovery.

lang: en

KrebsOnSecurity

krebsonsecurity.com

Brian Krebs — long-form investigative work on cybercrime ecosystems and operator unmasking.

lang: en

Risky Business · podcast & newsletter

risky.biz

Patrick Gray's weekly briefing — the dominant CTI/defender industry podcast. Strong attribution-curious analysis.

lang: en

Threat feed · 3

abuse.ch

abuse.ch

Operates URLhaus, MalwareBazaar, ThreatFox, Feodo Tracker, and YARAify. Free, high-quality IOC feeds widely consumed in MISP and OpenCTI deployments.

lang: en

eCrimeGroup statistics

ecrime.ch

Per-brand ransomware victim counts and timelines, useful for benchmarking which RaaS operations are growing or in decline.

lang: en

Ransomware.live

ransomware.live

Aggregated ransomware leak-site monitor — surfaces victim claims across active brands without the visitor having to touch the underlying Tor sites. Best public source for tracking ransomware activity in aggregate.

lang: en

Leak site · 4

Akira leak site

akira.[onion]

Akira's data-leak site, distinguished by the deliberately retro 1980s-terminal-styled web UI.

covers: akira
noteTor only · live extortion infrastructure

CL0P^_- LEAKS

cl0p.[onion]

Cl0p's data-leak site — operationally relevant when triaging MOVEit-era and GoAnywhere-era exposure of customer data.

covers: cl0p
noteTor only · live extortion infrastructure · use Ransomware.live above for safe aggregation rather than visiting directly

LockBit DLS (post-Cronos shell)

lockbitsupp.[onion]

LockBit's operator brand attempted to relaunch a leak site after the February 2024 NCA seizure. Activity since the Khoroshev indictment is largely posturing / re-uploads.

covers: lockbit
noteTor only · live extortion infrastructure · catalogued for research awareness, do not visit without explicit auth

Play leak site

play.[onion]

Play ransomware's data-leak site; the brand is a closed group (no public RaaS affiliate program) so victim posts are the primary public signal of operations.

covers: play
noteTor only · live extortion infrastructure

Telegram channel · 3

CyberAv3ngers public Telegram

t.me/cyberavengers (historical handle, removed/rotated)

IRGC-linked persona's claim channel for Unitronics PLC defacements and similar operations against water and wastewater utilities.

lang: ar·en·facovers: cyber-avengers
noteOFAC-sanctioned persona · interaction may have legal implications in the US — read coverage on Citizen Lab / Recorded Future instead

KillNet-aligned Telegram channels

multiple rotating t.me handles

KillNet's brand has fragmented; the original channels were removed and successor channels emerge under near-identical names. Operationally relevant for tracking pro-Russia DDoS campaign timing.

lang: rucovers: killnet
noteLive operations channel · brand fragmentation

NoName057(16) public Telegram channels

t.me/noname05716eng (and rotating mirrors)

DDoSia targeting list, victim claims, and recruitment posts. Channels rotate frequently after Telegram takedowns. The English-language channel mirrors the Russian-language original.

lang: ru·encovers: noname05716
noteLive operations channel · catalogued for situational awareness