threatintel
actor tracker
All actors
MITRE ATT&CK technique

T1485

View the official technique description on attack.mitre.org

Tracked actors using this technique · 6

Cadet Blizzard

cadet-blizzard

Russian state-sponsored intrusion set publicly assessed by Microsoft as associated with the GRU but operationally distinct from Forest Blizzard (APT28) and Seashell Blizzard (Sandworm). Conducted the…

RU · RussiaAPTModerate confidence
4 aliases4 TTPs1 event

Handala

handala

Pro-Palestine hacktivist persona operated by the Iranian MOIS-affiliated **Void Manticore** cluster — see the parent actor entry for the full attribution chain. Named for the Naji al-Ali cartoon char…

IR · IranHacktivistModerate confidence
0 aliases4 TTPs1 event

Homeland Justice

homeland-justice

Public-facing hacktivist persona operated by the Iranian MOIS-affiliated Void Manticore cluster, used for the July 2022 destructive intrusion of the Albanian government's central IT infrastructure. T…

IR · IranHacktivistHigh confidence
0 aliases3 TTPs1 event

Predatory Sparrow

predatory-sparrow

Pro-Israel hacktivist persona widely assessed by researchers and Israeli media as linked to Israeli military intelligence, though no government has publicly confirmed the relationship. Has claimed re…

IL · IsraelHacktivistLow confidence
1 aliases4 TTPs2 events

Sandworm

sandworm

Russian military-intelligence (GRU Unit 74455) intrusion set responsible for some of the most destructive cyberattacks publicly attributed to a nation-state: the 2015 and 2016 Ukrainian power-grid ou…

RU · RussiaAPTHigh confidence
5 aliases4 TTPs4 events

Void Manticore

void-manticore

Iranian state-sponsored intrusion set publicly attributed to the Ministry of Intelligence and Security (MOIS), specialised in destructive operations and conducting them under a rotating set of public…

IR · IranAPTModerate confidence
5 aliases4 TTPs3 events