#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

33 C
Dubai
Sunday, June 22, 2025
HomeTechnology & TelecomMicrosoft and CrowdStrike Unite to Unmask Cyber Adversaries with Shared Threat Actor...

Microsoft and CrowdStrike Unite to Unmask Cyber Adversaries with Shared Threat Actor Glossary

Date:

Related stories

Iran’s State TV Hijacked to Broadcast Protest Videos Satellite Hack amid Rising Tensions

On 18 June 2025, Iran’s state broadcaster, Islamic Republic of Iran...

Monster 7.3 Tbps DDoS Attack Blocked by Cloudflare in Historic Mitigation

In mid‑May 2025, Cloudflare successfully deflected the largest DDoS...

CISA Adds Actively Exploited Apple and TP-Link Vulnerabilities to KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has...
spot_imgspot_imgspot_imgspot_img

20 May 2025 – In a bid to reduce the fog of war in modern cyber defense, Microsoft and CrowdStrike have launched a shared threat actor glossary to standardize how cybercriminal groups are identified across security platforms. This pioneering collaboration addresses a critical issue: inconsistent threat actor naming that slows down incident response and complicates cybersecurity operations. With global threat volumes escalating, this alignment comes at a crucial time.

For years, threat actor naming inconsistencies have plagued defenders. A group identified as “Midnight Blizzard” by Microsoft might appear as “APT29,” “Cozy Bear,” or “UNC2452” in other vendors’ reports. These naming mismatches complicate attribution, delay investigations, and undermine trust among cybersecurity teams.

As highlighted in the NIST SP 800-1501 guidance on threat sharing, standardized communication of threat intelligence is key to improving collaboration and defense efficacy. Microsoft and CrowdStrike’s glossary directly aligns with this guidance.

H3: The New Glossary Explained

Announced on 20 May 2025, the glossary is a cross-reference table of known threat actors, mapping the names used by Microsoft and CrowdStrike to track identical or overlapping groups. It serves as a translation layer, allowing security teams to:

  • Improve confidence in threat actor identification
  • Correlate incident reports and telemetry faster
  • Align cross-platform security awareness
  • Minimize response time in the face of active attacks

Crucially, the glossary is not intended to replace existing naming conventions or enforce a global standard, but rather to bridge the gaps between security vendors.

Global Collaboration: Who’s Involved?

The effort is spearheaded by Microsoft Threat Intelligence and CrowdStrike Falcon Intelligence, two of the most prominent players in cybersecurity news. Their threat intel teams process billions of signals per day—with Microsoft alone analyzing over 84 trillion security signals daily across its platforms.

As per the official blog post, other major players are preparing to join:

  • Google/Mandiant
  • Palo Alto Networks (Unit 42)

This sets the stage for a vendor-agnostic coalition that may one day include government agencies, CERTs, and non-profits.

“The lack of standardized naming has been a persistent challenge. This glossary brings much-needed clarity and should be part of any organization’s threat intel toolkit.”
Adam Meyers, Head of Intelligence at CrowdStrike (via CrowdStrike press release, 20 May 2025)

Regional Impact: What It Means for MEA

H3: Middle East and Africa: Playing Catch-Up

In regions like the Middle East and Africa (MEA), where incident response capabilities vary widely and multilingual environments increase complexity, this move could significantly streamline threat intelligence operations. Many regional SOCs and CERTs rely on feeds from multiple international vendors—often with conflicting naming conventions.

Countries like UAE, Saudi Arabia, South Africa, and Kenya are developing robust national cyber strategies. The glossary provides an opportunity to align regional cyber defense initiatives with global best practices, especially in regulated sectors such as:

  • Telecom (regulated by CITC, NTRA)
  • Banking (compliance with SAMA, CBK, FSCA)
  • Energy & Oil (targeted by APT33 and other Iran-linked actors)

“Consistency in adversary naming across vendors will help African CSIRTs correlate reports and reduce the risk of response delays caused by confusion in attribution.”
Lungile Masondo, Threat Intelligence Lead, CERT-SA (commented in regional briefing on 21 May 2025)

Global Context: A Timely, Needed Move

The timing is not accidental. 2024 saw a record-breaking number of state-aligned cyber incidents, with actors like APT28, Charming Kitten, and Scattered Spider launching brazen attacks against critical infrastructure.

By aligning their taxonomies, Microsoft and CrowdStrike aim to enhance the speed and accuracy of correlation across platforms, giving SOC analysts and threat hunters a clearer path to action.

This move echoes efforts like the MITRE ATT&CK framework, which provides standardized techniques and procedures (TTPs) for threat actors. The glossary complements this by addressing the naming and attribution layer—effectively covering the “who” behind the “how.”

Technical Snapshot: TTPs and Reference Mapping

MITRE ATT&CK Mapping & Notable Actors

The glossary includes well-known threat actors tracked across both vendors, such as:

CrowdStrike NameMicrosoft NameKnown AliasesMITRE Group
COZY BEARMidnight BlizzardAPT29, UNC2452G0016
FANCY BEARForest BlizzardAPT28, STRONTIUMG0007
CHARMING KITTENPeach SandstormAPT35, PhosphorusG0060
WIZARD SPIDERSangria TempestUNC1878, DEV-0193G0102

Key TTP Examples:

  • Spear phishing via compromised cloud email accounts
  • Credential theft via token replay and session hijacking
  • Lateral movement using stolen credentials in hybrid environments

Boxed Tip:

Always correlate actor behavior with ATT&CK techniques (e.g., T1566.001 – Phishing: Spearphishing Attachment) and validate against endpoint logs.

Actionable Takeaways for Security Teams

  1. Integrate the glossary into SIEM, TIP, and threat intelligence platforms.
  2. Train SOC analysts to reference alternate actor names when triaging.
  3. Normalize naming conventions across internal and vendor-supplied reports.
  4. Enhance incident playbooks with mappings from the joint glossary.
  5. Use ATT&CK mapping for behavioral analysis in conjunction with the glossary.
  6. Subscribe to updates from Microsoft and CrowdStrike on new mappings.
  7. Cross-check threat feeds using the glossary during attribution analysis.
  8. Join public intel-sharing communities aligned with these taxonomies.
  9. Review past alerts where name mismatches may have impacted prioritization.
  10. Lobby for adoption of the glossary within regional cyber frameworks and compliance requirements.

Conclusion

The Microsoft-CrowdStrike threat actor glossary represents a landmark in cyber threat intelligence evolution. By improving clarity and alignment across vendors, it empowers security teams worldwide—including in emerging regions like MEA—to act faster and more confidently in the face of advanced threats. While not a universal standard, this effort lays the groundwork for a broader, community-driven solution to one of cybersecurity’s longest-standing friction points.

As cyberattacks grow in scale and sophistication, initiatives like this will be vital in helping defenders stay one step ahead.

Sources

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here