Cyber News

Unit 42 Introduces New Framework for Categorizing Threat Actors by Their Actions

Palo Alto Networks’ Unit 42 threat intelligence team has unveiled a comprehensive new methodology for attributing cyber attacks to specific threat actors, addressing long-standing challenges in the cybersecurity industry where attribution has been “more art than science.”

The Unit 42 Attribution Framework establishes a systematic three-tier approach that progresses from initial observations to confirmed threat actor identification.

The framework aims to eliminate confusion in threat group naming while providing greater analytical rigor to the attribution process.

Three-Level Classification System

The framework categorizes threats into three distinct levels. Activity Clusters represent the initial grouping of related cybersecurity events, requiring at least two connected incidents sharing indicators of compromise (IoCs), similar tactics, techniques, and procedures (TTPs), or targeting patterns.

These clusters receive names with the prefix “CL-” followed by motivation tags like STA (state-sponsored), CRI (crime-motivated), or UNK (unknown).

Temporary Threat Groups constitute the second tier, requiring six months of observation and rigorous analysis using the Diamond Model of Intrusion Analysis.

These groups, designated with “TGR-” prefixes, represent confirmed single-actor operations with persistent behavior patterns but insufficient evidence for full attribution.

The Unit 42 Attribution Framework – three levels of tracked activity.

The highest level consists of Named Threat Actors using Unit 42’s constellation naming schema, requiring high-confidence assessment with compelling evidence from multiple sources, including internal telemetry, trusted partners, and corroborated open-source intelligence.

Enhanced Analytical Standards

A key innovation involves integrating the Admiralty System, which assigns reliability scores (A-F) to sources and credibility ratings (1-6) to information.

Internal telemetry data receives a default reliability score of “A,” while IP addresses typically start with a credibility rating of 4 (“Doubtfully True”) due to their volatile nature.

The framework analyzes multiple data types, including malware code analysis, operational security consistency, network infrastructure, victimology, and timeline analysis.

Analysts examine TTP evolution patterns, custom infrastructure tools, and unique configurations to distinguish between different threat actors.

Real-World Application

Unit 42 demonstrated the framework’s effectiveness through their analysis of Stately Taurus, a threat actor linked to the Bookworm malware family.

The team successfully traced connections between infrastructure overlaps and malware variants, documenting their findings in an internal Attribution Framework scoresheet that tracks IoCs, TTPs, and intelligence artifacts with detailed justifications for scoring decisions.

The framework includes an internal Attribution Framework Review Board comprising multiple research teams to ensure accuracy and prevent premature attribution.

This systematic approach aims to avoid misattribution that could lead to misprioritized security controls and wasted resources.

Unit 42 hopes this framework will serve as a model for other threat research teams, contributing to the continued maturation of the threat intelligence profession while providing greater transparency into their internal analytical practices.

Priya

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago