threatintel
actor tracker
All actors

XENOTIME

xenotime · primary source: Other · first observed 2013
RU · RussiaState-sponsoredHigh confidence

Russian state-sponsored intrusion set responsible for the December 2017 TRITON/TRISIS malware attack on the Triconex safety instrumented system (SIS) at a Saudi Arabian petrochemical facility — the first publicly-known cyberattack deliberately designed to target industrial safety systems and risk loss of life. FireEye/Mandiant publicly disclosed the attack in December 2017, attributing the malware to the TRITON framework. The U.S. Treasury OFAC sanctioned the group's sponsor — the Central Scientific Research Institute of Chemistry and Mechanics (TsNIIKhM) in Moscow — on 23 October 2020 for its role in developing the TRITON malware. Dragos subsequently reported XENOTIME had expanded targeting to electric utilities beyond oil and gas.

Aliases

TEMP.VelesMandiantG0088MITRE

Motivations

pre-positioningsabotageespionage

Target sectors

energyoil and gaspetrochemicalicselectric utilities

Target countries

SAUS

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • XENOTIME
  • Russia
  • pre-positioning
  • sabotage
  • espionage
Capability
Infrastructure
Victim
  • energy
  • oil and gas
  • petrochemical
  • SA
  • US

MITRE ATT&CK techniques

Timeline

0 events
No timeline events recorded yet.

Indicators of compromise

0 indicators
No indicators of compromise have been cataloged for this actor yet.

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). XENOTIME — actor profile. Retrieved from https://threatintel.local/actors/xenotime

no cited activity