Every device and network attached to the IoT possesses, within itself, a universe of vulnerabilities. Each vulnerability enables the adversary, whether they be state, hacktivist or mercenary hackers, the technological capability to disrupt networks, exfiltrate sensitive data and wreak havoc on organizations of all sizes. Our adversaries stem from an endless stream of agendas and offensive strategies with the singular aim to pinpoint and exploit unpatched applications and vulnerable networks. State and corporate espionage cloaked beneath stealth and technological sophistication continuously plague our Nation’s critical infrastructure and federal agencies. Lackadaisical cybersecurity hygiene and cyber defensive training barely make it on the schedule for discussion in board rooms while bad actors plague and infest their networks.
This report, “Know Your Enemies 2.0” is an encyclopedia of bad actors stemming from the nation state, mercenary and hacktivist arenas. We cover threat groups not by use of a particular ranking system, rather by the dominant players categorized by geography. Zero days, malware, tool kits, exploit techniques, digital foot prints and targets are covered in-depth in this report. Information security experts, technology journalists and those in the legislative community who wish to gain a better comprehension of the adversary we as a Nation are facing are encouraged to make full use of the information contained in “Know Your Enemies 2.0”.
Some of the threat actors covered in this report are: Blue Termite, the Elderwood Platform, Deep Panda APT 30, APT 2, Tarh Andishan, Ajax, Dark Hotel, Bureau 121, Energetic Bear, Uroburos, Sofacy Group, the “Duke” family, Carbanak, SEA, Animal Farm, Hellsing, Shrouded Crossbow, among others.