{"id":127276,"date":"2023-04-18T08:00:00","date_gmt":"2023-04-18T15:00:00","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=127276"},"modified":"2024-07-03T08:09:06","modified_gmt":"2024-07-03T15:09:06","slug":"microsoft-shifts-to-a-new-threat-actor-naming-taxonomy","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2023\/04\/18\/microsoft-shifts-to-a-new-threat-actor-naming-taxonomy\/","title":{"rendered":"Microsoft shifts to a new threat actor naming taxonomy"},"content":{"rendered":"\n
May 2023 update<\/strong> \u2013 The actor that Microsoft tracks as Volt Typhoon targets US critical infrastructure with living-off-the-land techniques<\/a>.<\/p>\n\n\n\n April 19, 2023 update<\/strong> \u2013 We have published a JSON file mapping old threat actor names with their new names in the updated taxonomy, summarized here: https:\/\/aka.ms\/threatactors<\/strong><\/a>. We also added hunting queries that Microsoft customers can use while transitioning to the new taxonomy. See the Resources<\/a> section.<\/p>\n\n\n\n <\/p>\n\n\n\n