Cyber-espionage is one of the strangest trends in infosec today, because even if most people don’t understand what’s going on, who’s attacking who, and why is it important, most people flock to these reports like to a Katty Perry concert.
Making sense of all the malware nicknames, APT names, and finding out the country behind a cyber-espionage campaign can get on your nerves really quick.
Does the Turla Group mean anything to you? Is it a cyber-espionage campaign backed up by Russia or China? Or is it Iran? Did they use malware X, malware Y, or malware Z? How many operations did they run? When was the last? Where can you find the reports? Do other cyber-security firms use the same name, or do they have alternative nicknames?
All of these are common questions for both venerable infosec experts and some of our readers.
In the past, there have been some projects that tried to put some sense into all of these, like, , and a few other.
But there’s now even a better source, organized into a nice and colorful spreadsheet hosted on Google Docs, named.
There is no information on who put together the spreadsheet, but we did stumble upon it via Krypt3ia’s blog (so thanks). If you ever want to become an infosec ninja, learn it by heart.