Microsoft to name hackers after 'weather' events in new naming taxonomy

By IANS | Published: April 20, 2023 01:36 PM2023-04-20T13:36:04+5:302023-04-20T13:50:17+5:30

San Francisco, April 20 Microsoft has introduced a new naming taxonomy for hackers, in which they will be ...

Microsoft to name hackers after 'weather' events in new naming taxonomy | Microsoft to name hackers after 'weather' events in new naming taxonomy

Microsoft to name hackers after 'weather' events in new naming taxonomy

San Francisco, April 20 Microsoft has introduced a new naming taxonomy for hackers, in which they will be identified with names inspired by weather conditions.

As one of eight groups used by Microsoft to track cyber-attacks, hackers will now be named after weather events, which include storms, typhoons, blizzards, sleet, sandstorm, tempest, tsunami, and flood.

"With the new taxonomy, we intend to bring better context to customers and security researchers that are already confronted with an overwhelming amount of threat intelligence data. It will offer a more organised, memorable, and easy way to reference adversary groups so that organisations can better prioritise threats and protect themselves," Microsoft said in a blogpost.

The new taxonomy will include five key groups, including nation-state actors, financially motivated actors, private sector offensive actors (PSOAs), influence operations, and groups still in development.

For instance, if a new cybersecurity threat is discovered or comes from an unknown source, Microsoft will give it the temporary name 'Storm' and a four-digit number.

Nation-state hackers will be given names based on a specific family of weather conditions, which will reveal where the groups are operating from, according to the company.

Moreover, financially driven hacking groups will be called 'tempest', PSOAs will be called 'tsunamis', and influence operations will be called 'floods'.

"The naming approach we have used previously (Elements, Trees, Volcanoes, and DEVs) has been retired," explains John Lambert, Microsoft's CVP of threat intelligence.

Disclaimer: This post has been auto-published from an agency feed without any modifications to the text and has not been reviewed by an editor

Open in app