Skip to content

Threat Actors

ShadowMap maintains profiles of APT groups, cybercriminal organizations, hacktivists, and other threat actors. Each profile aggregates intelligence from MISP galaxy clusters to show the actor's origin, motivation, target sectors, associated malware, campaigns, and ATT&CK techniques -- giving your team the context needed to assess whether a specific actor poses a risk to your organization.

Overview

Threat Actors

Understanding the Data

The threat actor list displays the following columns:

ColumnDescription
NamePrimary name of the threat actor (e.g., APT29, Lazarus Group, FIN7)
CountryCountry of origin or attribution (displayed as a tag)
MotivationPrimary motivation: financial gain, espionage, disruption, ideology, or unknown
Target SectorsIndustries this actor is known to target (shows top 3; full list in detail view)
SynonymsAlternative names used by other vendors (shows top 2; full list in detail view)
MalwareCount of malware families associated with this actor
CampaignsCount of known campaigns or operations attributed to this actor
TechniquesCount of MITRE ATT&CK techniques observed in this actor's operations
First SeenEarliest known activity date for this actor
TrackBookmark icon to track/untrack this actor for dashboard widgets and alerts

Click any row to view the full threat actor profile, including detailed descriptions, full synonym lists, all associated malware, campaigns, techniques, and IOCs.

Filters

Use the filter bar to narrow the list:

FilterOptions
CountryFilter by actor's country of origin
MotivationFinancial, Espionage, Disruption, Ideology
Target SectorFilter by the industries the actor targets
Resource LevelGovernment, Organization, Individual -- indicates the actor's sophistication and resources
SearchFree-text search across actor names, synonyms, and descriptions

Track / Bookmark Feature

Click the bookmark icon on any actor to track them. Tracked actors:

  • Appear in your dashboard's Tracked Actor Activity widget
  • Help prioritize threat intelligence relevant to your organization
  • Can be used to build a watchlist of actors relevant to your industry

Export

Click the export button to download the current filtered view as an Excel file. The export respects all applied filters and search terms.

How to Use Threat Actor Intelligence

  • Risk assessment -- Identify actors that target your industry and region. Cross-reference their TTPs with your defensive capabilities.
  • Purple teaming -- Use actor TTPs to design realistic attack simulations. Focus on techniques from actors in your sector.
  • Executive briefing -- Filter by your sector and summarize the top actors, their motivations, and recent activity for leadership.
  • Detection engineering -- Navigate from an actor to their techniques (ATT&CK), then build detection rules covering their known methods.
  • Incident response -- When investigating an incident, search for matching IOCs, malware, or TTPs to attribute activity to a known actor.

ShadowMap by Security Brigade