The company aims to simplify things for security experts by proposing a novel system that categorizes hacker associations.
Large cybersecurity organizations that analyze cyber threats independently tend to name recognized groups of offenders and individual hackers the most. This is not a secret, and it is done according to a specific internal logic.
On Wednesday, Microsoft Threat Intelligence announced that it will begin using new names to refer to cybercriminal organizations and categorize them based on weather patterns.
The new taxonomy approach has the potential to simplify the jobs of cybersecurity professionals, including those at Redmond, and reduce the uncertainty caused by numerous hacker connections. With the new classification, you will be able to determine a new group’s origin and the type of criminal activities it engages in simply by looking at its name.
Microsoft is aware that other businesses in the cybersecurity sector have their own distinctive naming systems. The company intends to add more grouping names to represent analytical matches and assist clients in making informed decisions.
Threat actors belonging to the same family of weather conditions are assigned an adjective to distinguish organizations with different approaches, methods, infrastructure, aims, or other established patterns.
The Microsoft analysts will use the temporary name “Storm” (formerly known as “DEV”) and a four-digit number to refer to the most recent concentrations of malicious behavior. As researchers learn more about the attacker, the name Storm will be changed to a specific name according to the aforementioned classification.
Microsoft hopes that this taxonomic approach will make it easier to identify and remember threat actors, and that it will work well with the new badge system that allows for the visual recognition of fraudsters.