Home
Blog
What’s in a name? How attacks and attackers get their tags (Part 2 of 2)

What’s in a name? How attacks and attackers get their tags (Part 2 of 2)

Paul Ducklin
Paul Ducklin
02/05/2025
Share this article:

The trouble with names

In 🔗 Part 1, we looked into two issues: how individual threats such as brand new malware strains get named, and how the terminology for various classes of cyberattack come about.

Sometimes, threat names for malware – itself a very handy and self-descriptive name, neatly compressing the concept of malicious software into one word – provide at least some useful information about the threat itself.

But even a carefully-chosen threat name isn’t always enough, as we learned from the examples we used in Part 1, which came from the very early days of program-based and email-based malware, way back in 1987.

The names weren’t perfect even then, when new viruses were rare enough that you could still memorize the entire catalog of known malware if you really wanted to.

Indeed, many threat names in history, even during ultra-widespread malware attacks, have ended up confusingly unrelated to the threat in question.

The notorious and network-crushing Code Red worm in 2001, for example, infected almost every Windows computer where the IIS web server was turned on, which just happened to include a huge number of home users’ PCs, where it was enabled without them realizing.

From every infected computer, it then rapidly attacked other computers all over the world, generating internet-crushing levels of traffic in less-well-connected parts of the globe.

But Code Red was named after the Mountain Dew soft drink of that name, because the first analysts to deconstruct the malware had turned to its high caffeine and sugar content to pep themselves up during a marathon reverse-engineering session.

And the Conficker virus, which was automated zombie malware programmed to spread like crazy until 2009-04-01 and then to start upgrading itself with unknown additional strains of malware, is apparently just a foul-mouthed phrase used, presumably in frustration, by German-speaking analysts who were taking it apart.

Because the uninformative (if understandable) nature of the name wasn’t obvious in English, it caught on, although several mainstream products doggedly called it Downadup instead, which led to widespread confusion amongst users who were convinced they had two super-dangerous malware infections at the same time.

Not all bad

As we mentioned in Part 1, the sometimes mildly regrettable threat names we got stuck with 15 or 20 years ago barely matter these days.

So many new threat samples show up every day that there is not much point in finding a meaningful name for each one, and lots of mainstream threat detection products don’t bother to find even a vaguely relevant name, falling back on uninformative “identifiers” such as Generic and Suspicious instead.

Also, many malware samples today, just like Conficker back in 2009, are programmed primarily to fetch further malware.

Their final outcomes simply can’t be predicted, let alone named, in advance, except to say that those newly-downloaded malware samples could be different in every country, could vary on each sort of device, and could change repeatedly throughout each day.

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

The Big Five

More manageable approaches to threat naming these days look for terminology that encapsulates the types of cyberattack that each security hole is likely to lead to, thereby describing the sort of immediate side-effects that cybercriminals who exploit that hole are looking to achieve.

The “big five” terms that you will encounter in security bulletins are these:

  • RCE. Short for remote code execution, where “execution” is the jargon term for running program code on a computer. RCE exploits trick a remote computer into running a program of some sort, with no “Are you sure?” or “Do you want to launch this file?” warnings to alert the user. RCE attacks targeting brand new bugs are known as zero-days, because there are zero days during which even a well-informed user could have patched against them. Zero-day exploits typically command the highest rewards in legitimate bug bounty programs, or go for the highest prices on cybercrime forums.

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

  • EoP. Short for elevation of privilege, or escalation of privilege, this refers to an attack trick that starts off with access as a run-of-the-mill user, perhaps even just a GUEST account, and ends up at a more privileged level, typically as the SYSTEM or root user, bypassing any passwords or multi-factor authentication codes that a genuine system administrator would need. EoPs are often tag-teamed with RCEs so that a code execution exploit that gives only minimal system access can then be converted into a take-over-the-whole network attack.
  • Security bypass. A general-purpose term that means just what it says, and is often the sort of security exploit that sidesteps the need for attackers to bother with RCE. Ironically, even software that has been carefully protected against RCE exploits may have gaping bypass bugs. Examples include backdoor passwords coded into login screens, or URLs that give access to personal data but rely on obscurity instead of security, such as by using a public account number in the URL as if it were a cryptographically secure access code valid for one use only.
  • Information disclosure. Apps or operating system components sometimes give away more than they should, often because a programmer innocently kept hold of confidential information that should have been discarded. For example, log files that keep track of errors and anomalies sometimes over-diligently include memory addresses that give away secrets about the operating system internals, or leak plaintext passwords that were only ever supposed to be kept temporarily in memory.
  • DoS. If a bug makes it possible for an attacker to crash or disrupt a server or a service deliberately, or to get in the way of any software on your computer that you need to do your job, you’re looking at a denial-of-service vulnerability. DoS attacks generally don’t execute, elevate, bypass or disclose anything, so they don’t usually feature high up in risk assessments. But an attacker who can reliably crash your online payment service can nevertheless cause costly outages. And a short-term but disruptive DoS incident makes an ideal smokescreen for cybercriminals aiming to attack some other part of your network.

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

As you can see, these threat terms don’t denote attacks by any specific malware samples, or even any broad classes of malware such as viruses, worms, ransomware, spyware, and so on.

Loosely speaking, they’re useful in bug-fix release notes and other security bulletins for denoting the sort of attack that individual bugs or configuration errors could enable.

They also help you to predict the sort of attack symptoms that you, or your SOC (security operations center) team, might look out for if the listed bugs or configuration flaws are ever exploited, and help you choose the sort of proactive cybersecurity precautions that are likely to help the most.

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

The Other 5000

Of course, threat categorization isn’t as simple as knowing the five classes above.

A US non-profit called MITRE maintains a popular framework called ATT&CK (pronounced att-ack), which aims to maintain a well-documented taxonomy for classifying cyberthreats (individually and in categories), attack techniques, and attack groups, by which we mean the various cybergangs, threat actors and state-sponsored operators who carry out those attacks:

MITRE ATT&CK is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

If you’re getting started in cybersecurity and you are keen to get on top of the sort of jargon you will read and perhaps write in technical reports, the ATT&CK framework is a useful toolkit.

(Cybersecurity jargon has its place as a compact way for experts to share technical details without using the same lengthy terms every time, provided that everyone can agree on the same vocabulary.)

Unfortunately, there’s an awful lot of ATT&CK terminology to learn, or at least to be aware of, thanks to the breadth, depth, speed, power and complexity of today’s internet, and the fact that we’re still struggling to get the basics of cybersecurity right, 24 years after the Code Red worm, and 35 years after the first ransomware.


YOU MIGHT ALSO LIKE:

You can also watch this video on YouTube with more video controls, including speed-up.


The attackers themselves

The ATT&CK threat matrices (there are many charts, handily interlinked) and the semi-official nomenclature they introduce are not for the faint-hearted, as suggested in the image above, with a sprawling array of terminology and a curiously eclectic and incomplete list of threat names.

Similar complexity exists in the naming of threat groups, where different organizations have used a variety of naming tags over the years.

Some US organizations, for example, have used the suffix (or family name, if you like) Bear for threat actors believed to be associated with Russia, including the long-running and well-known nickname Fancy Bear, which dates all the way back to 2004.

Unfortunately, MITRE calls this group APT38 instead, and lists a dizzying array of what it called “associated groups” for that name. though it’s not clear if these are alternative names for the same gang, a list of other groups that might be related merely through a possible connection to Russia, or a collection of threat actors of unknown origin and motivation who use similar techniques:

[APT28’s] Associated groups [are]: IRON TWILIGHT, SNAKEMACKEREL, Swallowtail, Group 74, Sednit, Sofacy, Pawn Storm, Fancy Bear, STRONTIUM, Tsar Team, Threat Group-4127, TG-4127, Forest Blizzard, FROZENLAKE.

Microsoft, in contrast, uses its own threat designators based on conditions that generally denote bad or dangerous weather.

Some of these family names have vague associations with the part of the world that the threat actors are assumed to inhabit, such as Sandstorm for Iran and Typhoon for China.

Other names are used to denote cybercriminals with similar motivations but with unknown origin, and the generic word Storm is reserved for “groups in development,” however that is determined:

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber

Although family names tend to suggest an active working relationship between groups, the family names actually tie groups together largely by location or by motivation.

Apparently connected groups could, in fact, be competing for financial gain, or working towards different or unrelated social and political aims.

Nevertheless, Microsoft argues that its naming scheme is helpful, claiming that:

We offer a more organized, articulate, and easy way to reference threat actors so that organizations can better prioritize and protect themselves. We also aim to aid security researchers, who are already confronted with an overwhelming amount of threat intelligence data.

What to do?

We’ve used a two-part article to dig into the complexity of threat names, threat naming, and threat identification…

…and, to be honest, we’ve really only scratched the surface, as we saw from the graph in Part 1 showing the enormous rate at which new malware samples show up, and as we saw above from the screenshot of just one of many MITRE ATT&CK threat matrices, where we were able to squeeze just 25% of the simplified version of the chart into the image.

We didn’t have time to look into various other lists and taxonomies of threats and vulnerabilities, such as those from NIST (US National Institute of Standards and Technology), OWASP (Open Worldwide Application Security Project), and many curated threat collections and descriptions available on GitHub and other publicly-available repositories.

The good news, however, is that although charts like the ATT&CK matrices can teach you a lot of convenient terminology for threats, and teach you where and how to look for them in your network and in your logs:

  • Building a human-centric cybersecurity culture in your business doesn’t require you, or your staff, to master lots of jargon. Choose a human-focused security partner such as SolCyber, and you will be able to communicate with us and with your staff in plain English instead.
  • Exactly identifying threats and threat groups often isn’t terribly important. In fact, it often isn’t possible even if you are a seasoned researcher or member of the intelligence services. Sometimes, even major security vendors are forced to qualify a threat group identification with words along the lines of, “We estimate with X% probability that threat Y is associated with group Z.”
  • Getting the basics right gives you a much better start than diving into details. You can protect yourself robustly against ransomware without knowing the difference between the Qilin and Rhysida gangs, for example, and you can help to prevent ransomware with the same tools and techniques that will also head off most other sorts of malware. Indeed, many ransomware attacks don’t start with a ransomware gang, but arrive at the end of a chain of previous intruders and attackers.
  • You don’t need to know all this stuff yourself. Why not let SolCyber take care of the details for you? We already know the jargon, so we can handle the threats and the threat actors for you, but we’re not just a technically-savvy MSSP (managed security service provider) that acts as your SOC. We also actively help you build the very sort of human-centric, plain-English cybersecurity culture that we mentioned above. You and your users will end up protecting your business and knowing a lot about practical cybersecurity yourselves, without memorizing pages and pages of threat-naming jargon!

Get in touch today, and let us help you improve your security posture fast.


Learn more about our mobile security solution that goes beyond traditional MDM (mobile device management) software, and offers active on-device protection that’s more like the EDR (endpoint detection and response) tools you are used to on laptops, desktops and servers:

What's in a name? How attacks and attackers get their tags (Part 2 of 2) - SolCyber


More About Duck


Paul Ducklin is a respected expert with more than 30 years of experience as a programmer, reverser, researcher and educator in the cybersecurity industry. Duck, as he is known, is also a globally respected writer, presenter and podcaster with an unmatched knack for explaining even the most complex technical issues in plain English. Read, learn, enjoy!

Featured image of red roses by Biel Morro via Unsplash.

Paul Ducklin
Paul Ducklin
02/05/2025
Share this article:

Table of contents:

The world doesn’t need another traditional MSSP 
or MDR or XDR.

What it requires is practicality and reason.

Related articles

Businesses don’t need more security tools; they need transparent, human-managed cybersecurity and a trusted partner who ensures nothing is hidden.

It’s time to move beyond the inadequacies of current managed services and experience true security management.
No more paying for useless bells and whistles.
No more time wasted on endless security alerts.
No more dealing with poor automated services.
No more services that only detect but don’t respond.
No more breaches caused by all of the above.

Follow us!

Subscribe

Join our newsletter to stay up to date on features and releases.

By subscribing you agree to our Privacy Policy and provide consent to receive updates from our company.

CONTACT
©
2025
SolCyber. All rights reserved
|
Made with
by
Jason Pittock

I am interested in
SolCyber XDR++™

I am interested in
SolCyber MDR++™

I am interested in
SolCyber Extended Coverage™

I am interested in
SolCyber Foundational Coverage™

I am interested in a
Free Demo

10607