CEA
CasesEscalationInfrastructureGovernanceAttributionTimelineActorsSectorsCompare
Brief GeneratorNormsLegalMethodologySourcesAbout

Threat Actor Profiles

Named threat actors in the dataset, their state nexus, attributed operations, and behavioural patterns.

Sandworm Team (GRU Unit 74455)

Russia — GRU (Main Intelligence Directorate), assessed to be Unit 74455

6 cases
DestructiveEnergyTelecommunicationsCritical Infrastructure2015–2023

Lazarus Group (RGB, North Korea)

North Korea — Reconnaissance General Bureau (RGB)

3 cases
DestructiveFinanceMediaHealthcare2014–2017

SVR / APT29 / Cozy Bear

Russia — SVR (Foreign Intelligence Service)

2 cases
EspionageGovernmentTechnologyDefense2020–2024

Hafnium / PRC-Linked Groups

China — Ministry of State Security (MSS) and affiliated entities

4 cases
EspionageGovernmentTechnologyTelecommunications2021–2024

Scattered Spider

Non-state: loosely organized English-speaking individuals (US/UK)

1 case
RansomwareTechnologyFinanceMultiple2023

Iranian State-Linked Actors (IRGC/MOIS)

Iran — Islamic Revolutionary Guard Corps (IRGC) and Ministry of Intelligence and Security (MOIS)

2 cases
DestructiveEnergyGovernment2012–2022

Unknown / Contested Attribution

Various — includes cases where attribution is contested, unconfirmed, or points to non-state or negligence-based incidents

12 cases
EspionageMultiple2010–2024
Cyber Escalation Atlas™

A policy-grade interactive reference for understanding cyber operations, escalation dynamics, and governance frameworks.

Explore

  • Cases
  • Escalation
  • Infrastructure
  • Governance
  • Attribution
  • Timeline
  • Actors
  • Sectors
  • Compare

Resources

  • Brief Generator
  • Norms
  • Legal
  • Methodology
  • Sources
  • About

Faultline

  • Faultline Hub
  • Nuclear Infrastructure Atlas
  • Orbital Risk Tracker
  • Space Mandate Atlas

© 2026 Risa Koyanagi. All rights reserved.

A Faultline project by Risa Koyanagi