Skip to main content
Threat Activity Groups

Your first line of defense against adversaries

Powered by human intelligence, Dragos’ main threat detection method is based on analytics codified by our Threat Intelligence team. Our experts track adversary behaviors and extract their tactics, techniques, and procedures (TTP), which are then characterized into threat analytics we use to power the Dragos Platform’s accurate threat detection capabilities.

Dragos Industrial Cybersecurity

What goes into tracking the world’s top Industrial Threat Activity Groups?

Dragos collects and analyzes information on cyber intrusions and attempts to compromise ICS networks
We create profiles of known groups targeting ICS environments so we can focus on how they operate
Finally, we establish robust analytics with comprehensive data around actions, capabilities, and intentions

Learn how we classify activity groups.

Sergio Caltagirone, Vice President of Threat Intelligence, shares how to properly leverage the Diamond Model for Intrusion Analysis to stop incidents and categorize threat activity.
Watch Webinar

Threat Activity Groups We’re Tracking

The Threat Activity Group reports below are compiled by our expert practitioners to provide awareness about your threat landscape and evolving threats, so you can create defensive plans to protect your ICS environments.

ERYTHRITE adversary group trading card from Dragos
since 2020
ERYTHRITE is an activity group that broadly targets organizations in the U.S. and Canada with ongoing, iterative malware campaigns.
Vanadinite adversary group trading card from Dragos
since 2019
IT compromise and information gathering
dymalloy logo
since 2016
Deep ICS environment information gathering, operator credentials, industrial process details
wassonite logo
since 2018
IT compromise and information gathering

Dragos Threat Intelligence

Want more in-depth visibility of adversaries, vulnerabilities and threats? Full reports detailing the tactics, techniques, and procedures (TTP) and Dragos’ research is available to our Threat Intelligence subscribers. Request a free 30-day trial today.