Skip to main content
Threat Activity Groups

Your first line of defense against adversaries

Powered by human intelligence, Dragos’ main threat detection method is based on analytics codified by our Threat Intelligence team. Our experts track adversary behaviors and extract their tactics, techniques, and procedures (TTP), which are then characterized into threat analytics we use to power the Dragos Platform’s accurate threat detection capabilities.

What goes into tracking the world’s top Industrial Threat Activity Groups?

Collect Information
Dragos collects and analyzes information on cyber intrusions and attempts to compromise ICS networks
Create profiles
We create profiles of known groups targeting ICS environments so we can focus on how they operate
Report sheets
Finally, we establish robust analytics with comprehensive data around actions, capabilities, and intentions

Learn how we classify activity groups.

Sergio Caltagirone, Vice President of Threat Intelligence, shares how to properly leverage the Diamond Model for Intrusion Analysis to stop incidents and categorize threat activity.
Watch Webinar

Threat Activity Groups We’re Tracking

The Threat Activity Group reports below are compiled by our expert practitioners to provide awareness about your threat landscape and evolving threats, so you can create defensive plans to protect your ICS environments.

Xenotime
since 2014
Focused on physical destruction and long-term persistence
Covellite
since 2017
IT compromise with hardened anti-analysis malware against industrial orgs
Electrum
since 2017
Electric grid disruption and long-term persistence
Dymalloy
since 2017
Deep ICS environment information gathering, operator credentials, industrial process details
Magnallium
since 2017
IT network limited, information gathering against industrial orgs
Raspite
since 2017
IT network limited, information gathering on electric utilities with some similarities to CHRYSENE
Hexane
since 2018
IT compromise and information gathering against ICS entities
Parisite
since 2017
VPN compromise of IT networks to conduct reconnaissance
Wassonite
since 2018
IT compromise and information gathering
Allanite
since 2017
Watering-hole and phishing leading to ICS recon and screenshot collection
Chrysene
since 2017
IT compromise, information gathering and recon against industrial orgs

Dragos Threat Intelligence

Want more in-depth visibility of adversaries, vulnerabilities and threats? Full reports detailing the tactics, techniques, and procedures (TTP) and Dragos’ research is available to our Threat Intelligence subscribers. Request a free 30-day trial today.