Night Dragon

Threat Actor updated 4 months ago (2024-05-04T16:11:23.801Z)
Download STIX
Preview STIX
Night Dragon is a recognized threat actor, a term used in cybersecurity to denote an individual or group that carries out malicious activities. These entities can range from single individuals to large organizations or even government bodies. Night Dragon has been associated with several significant cyber threats and attacks. One notable instance was in 2011, when cybersecurity firm McAfee reported a series of attacks on energy companies, attributing them to Night Dragon. This group's activities have been marked by their sophistication and potential for causing substantial disruption. During the investigation into another threat actor known as Space Pirates, there were numerous overlaps found with Night Dragon's activities. This investigation revealed connections between Night Dragon and several other prominent threat actors, including Winnti (APT41), Bronze Union (APT27), TA428, RedFoxtrot, and Mustang Panda. The intersections suggest either collaboration or shared tactics among these groups, indicating a complex and interconnected landscape of cybersecurity threats. However, it should be noted that some previous associations made between Night Dragon and certain Advanced Persistent Threat (APT) groups have been reevaluated and corrected. While the exact details of this correction aren't specified, it implies that the understanding of Night Dragon's activities and affiliations is dynamic and subject to change as new information comes to light. This underscores the importance of continuous monitoring and analysis in the field of cybersecurity.
Description last updated: 2023-10-10T21:05:51.858Z
Aliases We are not currently tracking any aliases
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Source Document References
Information about the Night Dragon Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
MITRE
2 years ago
Musical Chairs Playing Tetris | NETSCOUT
CERT-EU
a year ago
Space Pirates: analyzing the tools and connections of a new hacker group