Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

APT41 — Enhanced Profile

State-Sponsored Espionage · Double Dragon · BARIUM · MITRE G0096
APT41 Double Dragon Winnti BARIUM Earth Baku Bronze Atlas HOODOO

APT41 is a prolific Chinese state-sponsored threat actor conducting both espionage and financially motivated intrusions. With 3,535 evidence items across 36 distinct sources and 2 pipelines, APT41 targets technology, healthcare, telecom, and government sectors globally. Attributed to Chinese Ministry of State Security contractors operating under MITRE G0096. Arsenal includes 4 malware families, 19 CVEs, and 9 ATT&CK techniques.

Critical Severity State-Sponsored Espionage + Financial 19 CVEs
3,535
Total Evidence
All unique items
36
Distinct Sources
Across 2 pipelines
19
CVEs Referenced
Incl. Log4Shell / ProxyLogon
9
ATT&CK Techniques
T1190 / T1566 / T1078
30
Named Victims
Top: BJ Grupo / moser-spiel
4
Malware Families
Jasmin RAT / WINNKIT
12
Industries Targeted
Tech / Gov / Telecom lead
5
Related Actors
Winnti / Earth Baku / Blackfly
01

Geographic Targeting

8 countries targeted
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

APT41's top five targeted industries by evidence count. Technology, Government/Defense, and Telecom lead — consistent with a state-sponsored actor with both espionage and financially-motivated mandates.

See /industry for full cross-sector analysis across all 12 industries
03

Infrastructure / Tooling

4 malware families observed

APT41's malware arsenal spans custom RATs, rootkits, and commercial tools. Jasmin RAT dominates evidence volume with 19 references, while WINNKIT represents the most advanced kernel-level capability. Evidence counts reflect pipeline observations across the collection window.

04

CVE Arsenal

Top 10 of 19 CVEs

APT41-cluster evidence references 19 CVEs spanning Apache, Microsoft Exchange, Pulse Secure, Citrix, F5, GitLab, MobileIron, and Atlassian. The top 10 by CVSS score define the primary attack-surface exposure exploited within hours of public disclosure.

05

Tactics, Techniques, and Procedures

9 ATT&CK techniques
06

Named Victims

12 from pipeline

Black Swarm captured the following named victims from APT41-cluster evidence. Evidence counts reflect repeated dark-web observation across multiple collection cycles.

+ 18 additional victims in pipeline

07

Collection Coverage

~80 items · Apr 27 – May 13

Evidence arrival density across the 17-day collection window. APT41 has 2 active pipelines — dark web (60%) and OSINT feed (40%). No social pipeline signal in this window.

08

Campaign Tracker

2 named campaigns

Named campaigns associated with the APT41 cluster in Black Swarm evidence. Campaign linkage comes from entity resolution and analyst tagging.

09

MITRE ATT&CK Mapping

9 techniques
10

Ecosystem

5 related actors
11

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
12

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

Severity: Base high boosted by multi-source. 3,535 items across 36 sources reflect APT41's broad collection footprint — not 3,535 independent intrusions.

Double Dragon designation: The financially motivated ransomware operations (Jasmin, Incransom) are separate from espionage tradecraft. Do not conflate espionage victims with ransomware victims.

Evidence mix: The 2-pipeline split (dark web 60% / OSINT feed 40%) reflects monitoring infrastructure bias. Social pipeline has zero APT41 signals in this window.

9 ATT&CK techniques: Real APT41 tradecraft is broader. Only techniques with direct evidence-pipeline signal are shown. Resource Development and Reconnaissance stages are known gaps.

CVE enrichment partial: 19 CVEs tracked but only a subset have full NVD data in pipeline. CVSS shown from NVD public records.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

DragonForce — Enhanced Profile

Ransomware-as-a-Service · Double Extortion · Open Registration
DragonForce DragonForce RaaS DragonBlog

DragonForce is a ransomware-as-a-service (RaaS) operation with open registration — affiliates can build their own RaaS team within one hour. The group operates a Tor-hosted leak site (DragonBlog) and runs a sustained double-extortion model, listing exfiltrated file sizes and download links for victim data. With 7,554 evidence items across 3 pipelines, DragonForce is the most-observed ransomware operation in Black Swarm's collection window.

High Severity Ransomware-as-a-Service Double Extortion Open Registration
7,553
Total Evidence
All unique items
3
Pipelines
dark web, osint feed, social
0
CVEs Referenced
None in pipeline
0
ATT&CK Techniques
None tagged
12
Named Victims
Top: Cult Wines
1
Malware Families
See infrastructure
5
Industries
Legal Services lead
7
Countries Observed
United States top
01

Geographic Targeting

7 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

DragonForce's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

1 entries

Malware families and tooling attributed to the DragonForce cluster.

04

Tactics, Techniques, and Procedures

0 ATT&CK techniques
05

Named Victims

12 from pipeline

Victims captured from DragonForce cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

7,553 items · 14-day window

Evidence arrival density across the collection window for DragonForce.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the DragonForce cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

0 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

DragonForce's open-registration model means affiliate counts and TTPs vary widely. The 7,554 evidence count reflects leak-site postings and indexer mirrors, not 7,554 separate intrusions. Victim sectors include legal, franchising, landscaping, medical equipment, flooring, construction — broad mid-market targeting with no clear vertical preference.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Cobalt Group — Enhanced Profile

Mixed Cluster · Cuba / Black Basta / Snatch / Yanluowang
Cobalt Group Cobalt Strike Beacon Cuba Colddraw Black Basta

The cobalt_group cluster aggregates multiple ransomware operations sharing common tagging rather than a single unified actor — Cuba/Colddraw (active since 2019), Black Basta (RaaS, 2022), Snatch (Safe Mode evasion, 2021), and Yanluowang (small enterprise). Cluster also includes Cobalt Strike Beacon C2 infrastructure detections. With 4,992 evidence items, 27 CVEs, and 2,925 distinct victim tags, this cluster is broad but low-attribution-confidence.

High Severity Mixed Cluster Low Attribution Confidence 27 CVEs
4,989
Total Evidence
All unique items
3
Pipelines
dark web, social, osint feed
10
CVEs Referenced
Pipeline-attributed
1
ATT&CK Techniques
T1071.004
7
Named Victims
Top: Stratford University
5
Malware Families
See infrastructure
5
Industries
Manufacturing lead
8
Countries Observed
United States top
01

Geographic Targeting

8 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

Cobalt Group's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

5 entries

Malware families and tooling attributed to the Cobalt Group cluster.

04

CVE Arsenal

Top 10 CVEs

Cobalt Group cluster evidence references 10 CVEs. Top entries by CVSS define the primary attack-surface exposure exploited within hours of public disclosure.

05

Tactics, Techniques, and Procedures

1 ATT&CK techniques
06

Named Victims

7 from pipeline

Victims captured from Cobalt Group cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

07

Collection Coverage

4,989 items · 14-day window

Evidence arrival density across the collection window for Cobalt Group.

08

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the Cobalt Group cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

09

MITRE ATT&CK Mapping

1 techniques
10

Ecosystem

cluster-keyed
11

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
12

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

The cobalt_group cluster_key is a routing taxonomy, not an attribution claim. Cuba, Black Basta, Snatch, and Yanluowang are operationally independent. Confidence in cluster coherence as a single actor is low; this profile represents the aggregate signal across all operations sharing the tag.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Qilin — Enhanced Profile

Ransomware-as-a-Service · Double Extortion · Cross-Sector
Qilin Agenda Qilin RaaS

Qilin is a ransomware-as-a-service (RaaS) operation conducting double-extortion attacks across 16+ sectors including manufacturing, healthcare, financial services, public sector, education, and energy. Infrastructure includes Tor-hosted .onion leak sites, victim data publication, and negotiation chat portals. With 1,196 evidence items across 3 pipelines and 1,081 distinct victim tags, Qilin shows sustained operational tempo.

Medium Severity Ransomware-as-a-Service Double Extortion 16+ Sectors
1,196
Total Evidence
All unique items
3
Pipelines
dark web, social, osint feed
2
CVEs Referenced
Pipeline-attributed
0
ATT&CK Techniques
None tagged
3
Named Victims
Top: Various Manufacturing
1
Malware Families
See infrastructure
5
Industries
Business Services lead
8
Countries Observed
United States top
01

Geographic Targeting

8 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

Qilin's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

1 entries

Malware families and tooling attributed to the Qilin cluster.

04

CVE Arsenal

Top 2 CVEs

Qilin cluster evidence references 2 CVEs. Top entries by CVSS define the primary attack-surface exposure exploited within hours of public disclosure.

05

Tactics, Techniques, and Procedures

0 ATT&CK techniques
06

Named Victims

3 from pipeline

Victims captured from Qilin cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

07

Collection Coverage

1,196 items · 14-day window

Evidence arrival density across the collection window for Qilin.

08

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the Qilin cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

09

MITRE ATT&CK Mapping

0 techniques
10

Ecosystem

cluster-keyed
11

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
12

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

Qilin's broad sector coverage reflects opportunistic targeting rather than vertical specialization. The 1,196 evidence count includes leak-site posts mirrored across multiple indexers (ransomware.live, ransomwatch). No social-engineering or initial-access tradecraft detail is captured in our pipeline.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Everest Group — Enhanced Profile

Mixed Cluster · Unattributed · Static-Web Tagging
Everest Group Everest RaaS

The everest_group cluster is largely unattributed — multiple evidence items reference the Everest Group name and website, but tags such as static-website, html, and client-side-javascript indicate that much of the captured signal is benign website indexing rather than ransomware activity. Confidence is split: 100% for tier4_replay sources, 0% for everest- sources. With 1,165 evidence items, this cluster has high noise.

Medium Severity Low-Confidence Cluster Likely Mixed Signal
1,165
Total Evidence
All unique items
3
Pipelines
dark web, osint feed, social
0
CVEs Referenced
None in pipeline
0
ATT&CK Techniques
None tagged
2
Named Victims
Top: Everest Insurance
1
Malware Families
See infrastructure
3
Industries
InsuranceSector lead
4
Countries Observed
Singapore top
01

Geographic Targeting

4 countries
Top Targeted Regions
02

Industry Targeting

Top 3 sectors

Everest Group's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

1 entries

Malware families and tooling attributed to the Everest Group cluster.

04

Tactics, Techniques, and Procedures

0 ATT&CK techniques
05

Named Victims

2 from pipeline

Victims captured from Everest Group cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

1,165 items · 14-day window

Evidence arrival density across the collection window for Everest Group.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the Everest Group cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

0 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

This cluster has high noise from benign website indexing. The 1,165 evidence count includes static-website tags, which suggests crawled site mirrors rather than ransomware leak-site activity. Treat with caution; investigate cluster_key disambiguation before acting.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Deadeye Jackal — Enhanced Profile

Ransomware Operation · Tor Leak Site · Cross-Pipeline Corroboration
Deadeye Jackal DeadeyeJackal

Deadeye Jackal is a ransomware operation observed posting new victim entries on its Tor-hosted leak site, targeting mid-sized organizations across multiple sectors with 14-day countdowns to full data publication. Cross-pipeline corroboration is strong: ransomwatch (clearnet GitHub mirror) and ransomware.live indexed the same listings within hours. 1,161 evidence items, 704 distinct victim tags, sustained tempo.

Medium Severity Ransomware Operation Tor Leak Site Multi-Source Corroboration
1,160
Total Evidence
All unique items
3
Pipelines
dark web, osint feed, social
0
CVEs Referenced
None in pipeline
0
ATT&CK Techniques
None tagged
3
Named Victims
Top: Mid-sized Mfg
1
Malware Families
See infrastructure
5
Industries
Business Services lead
8
Countries Observed
United States top
01

Geographic Targeting

8 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

Deadeye Jackal's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

1 entries

Malware families and tooling attributed to the Deadeye Jackal cluster.

04

Tactics, Techniques, and Procedures

0 ATT&CK techniques
05

Named Victims

3 from pipeline

Victims captured from Deadeye Jackal cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

1,160 items · 14-day window

Evidence arrival density across the collection window for Deadeye Jackal.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the Deadeye Jackal cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

0 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

The 1,161 evidence count reflects multi-mirror amplification of the same underlying leak posts (Tor leak site → ransomwatch → ransomware.live). De-duplicated victim count is 704. No initial-access tradecraft detail is captured in our pipeline.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

CoinbaseCartel — Enhanced Profile

Ransomware Group · Hospitals · Retail · Construction
Coinbase Cartel CoinbaseCartel

Coinbasecartel is a ransomware group observed targeting Hospitals, Retail, and Construction sectors, with operational tempo increasing in recent weeks based on leak-site activity. Cluster is dark-web heavy (1,044 evidence items from dark_web, only 7 from social). Polish hospital network represents the largest concentrated victim group. With 1,051 evidence items.

Medium Severity Ransomware Operation Hospitals + Healthcare Targeting
1,051
Total Evidence
All unique items
2
Pipelines
dark web, social
0
CVEs Referenced
None in pipeline
0
ATT&CK Techniques
None tagged
3
Named Victims
Top: Polish Hospital Network
1
Malware Families
See infrastructure
5
Industries
Tech lead
8
Countries Observed
Poland top
01

Geographic Targeting

8 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

CoinbaseCartel's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

1 entries

Malware families and tooling attributed to the CoinbaseCartel cluster.

04

Tactics, Techniques, and Procedures

0 ATT&CK techniques
05

Named Victims

3 from pipeline

Victims captured from CoinbaseCartel cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

1,051 items · 14-day window

Evidence arrival density across the collection window for CoinbaseCartel.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the CoinbaseCartel cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

0 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

Coinbasecartel signal is overwhelmingly from dark-web leak-site monitoring. The cluster has 21 distinct victim tags — much lower than other ransomware groups at the same evidence count, suggesting concentrated repeat-monitoring of a smaller victim set.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Scattered Spider — Enhanced Profile

Financially-Motivated Cybercrime · Social Engineering · MFA Bypass
Scattered Spider UNC3944 Muddled Libra Octo Tempest Roasted 0ktapus

Scattered Spider is a financially-motivated cybercrime group known for aggressive social engineering and MFA bypass targeting financial services and high-tech sectors. Named tooling observed: PROMPTFLUX, BRICKSTORM, QUIETVAULT, PROMPTSTEAL. Referenced in Mandiant M-Trends 2026. With 930 evidence items, primarily from social pipeline (554) plus OSINT-feed corroboration (374).

Medium Severity Cybercrime Social Engineering MFA Bypass
928
Total Evidence
All unique items
2
Pipelines
social, osint feed
0
CVEs Referenced
None in pipeline
0
ATT&CK Techniques
None tagged
2
Named Victims
Top: Financial Services Co
4
Malware Families
See infrastructure
5
Industries
financial lead
7
Countries Observed
Finland top
01

Geographic Targeting

7 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

Scattered Spider's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

4 entries

Malware families and tooling attributed to the Scattered Spider cluster.

04

Tactics, Techniques, and Procedures

0 ATT&CK techniques
05

Named Victims

2 from pipeline

Victims captured from Scattered Spider cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

928 items · 14-day window

Evidence arrival density across the collection window for Scattered Spider.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the Scattered Spider cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

0 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

Scattered Spider tradecraft is primarily social engineering — phone-based pretexting, MFA fatigue, SIM swap. Our pipeline captures public reporting and analyst tagging, not first-hand intrusion telemetry. Real victim count is much higher than the 5 distinct tags captured (Casino + retail breaches not all named).

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

APT14 — Enhanced Profile

Mixed Cluster · Spook + Red + Avaddon + SafePay
APT14 Spook Red Ransomware Avaddon SafePay

The apt14 cluster aggregates four distinct ransomware operations — Spook (2021, defunct), Red Ransomware (2024), Avaddon (2020-2021, defunct), and SafePay (2024+, growing). No evidence links these operations to a single actor; the cluster key is a routing taxonomy. SafePay is the active operation — claimed 471 victims by mid-2025, including UK telematics firm Microlise (1.2TB exfiltration). With 838 evidence items.

High Severity Mixed Cluster SafePay Active Spook/Avaddon Defunct
838
Total Evidence
All unique items
2
Pipelines
dark web, osint feed
0
CVEs Referenced
None in pipeline
2
ATT&CK Techniques
T1486, T1059
12
Named Victims
Top: CABINET FONT GUILLOT
4
Malware Families
See infrastructure
5
Industries
Manufacturing lead
8
Countries Observed
Canada top
01

Geographic Targeting

8 countries
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

APT14's top targeted industries by evidence count, derived from pipeline tagging.

See /industry for full cross-sector analysis
03

Infrastructure / Tooling

4 entries

Malware families and tooling attributed to the APT14 cluster.

04

Tactics, Techniques, and Procedures

2 ATT&CK techniques
05

Named Victims

12 from pipeline

Victims captured from APT14 cluster evidence. Counts reflect repeated dark-web observation across collection cycles.

06

Collection Coverage

838 items · 14-day window

Evidence arrival density across the collection window for APT14.

07

Campaign Tracker

— pipeline-tagged

Named campaigns associated with the APT14 cluster are not currently isolated in pipeline tagging. Campaign linkage requires analyst enrichment beyond cluster-level evidence aggregation.

08

MITRE ATT&CK Mapping

2 techniques
09

Ecosystem

cluster-keyed
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

apt14 is a cluster routing taxonomy, not an attribution claim. Spook (active Sep-Oct 2021, 35 victims) and Avaddon (active Feb 2020-Sep 2021, 146 victims) are defunct. Red Ransomware (2024, 16 victims) has limited activity. SafePay is the active operation; 471 victims claimed by mid-2025 with average 38.7-day attack-to-claim delay.

Black Swarm Intelligence · Enhanced Profile · Updated 2026-05-15

Play — Enhanced Profile

Ransomware-as-a-Service · Balloonfly · PlayCrypt · MITRE G1040
Play Balloonfly PlayCrypt FLEA Ransom Cartel

Play ransomware group operates a sophisticated RaaS model responsible for attacks on government, critical infrastructure, and enterprise targets globally. With 1,406 evidence items across 15 distinct sources, Play targets technology, manufacturing, and legal sectors. Notable victims include Cisco and CD Projekt. Arsenal includes 15 malware families and 8 ATT&CK techniques.

High Severity Ransomware-as-a-Service Critical Infra Targeting Cisco / CD Projekt
1,406
Total Evidence
All unique items
15
Distinct Sources
Across 3 pipelines
0
CVEs in Pipeline
Known gap: RR-195
8
ATT&CK Techniques
T1190 / T1078 / T1059
30
Named Victims
Cisco / CD Projekt / Specflue
15
Malware Families
PlayCrypt / HelloKitty / Cobalt
10
Industries Targeted
Tech / Mfg / Legal lead
5
Related Actors
HelloKitty / Balloonfly
01

Geographic Targeting

8 countries / US + UK lead
Top Targeted Regions
02

Industry Targeting

Top 5 sectors

Play's top five targeted industries by evidence count. Technology, Manufacturing, and Legal Services lead — Play's closed RaaS model favors high-value targets with sensitive data and high ransom tolerance.

See /industry for full cross-sector analysis across all 10 industries
03

Infrastructure / Tooling

15 malware families observed

Play's toolset combines custom ransomware with commercial and open-source tools for lateral movement and defense evasion. PlayCrypt and HelloKitty represent the primary payloads, while EDRKillShifter is Play's custom EDR-disabling tool unique to this actor cluster.

04

Tactics, Techniques, and Procedures

8 ATT&CK techniques
05

Named Victims

12 from pipeline

Black Swarm captured the following named victims from Play-cluster evidence via the Play leak site. Evidence counts reflect repeated leak-site observation across multiple collection cycles.

+ 18 additional victims in pipeline

06

Collection Coverage

~100 items · Apr 27 – May 13

Evidence arrival density across the 17-day collection window. Dense activity on May 5–8 and May 11–13 reflects burst leak-site publication cycles. 70% dark web, 20% social, 10% OSINT feed.

07

Campaign Tracker

2 named campaigns

Named campaigns associated with the Play cluster in Black Swarm evidence.

08

MITRE ATT&CK Mapping

8 techniques
09

Ecosystem

5 related actors
10

Intelligence Profile

Severity + pipeline breakdown
Severity Assessment
Source Pipeline Distribution
11

Honest Scope-Bounding

What Black Swarm does NOT carry
Methodology Transparency

Severity: High classification based on evidence volume and notable victims (Cisco, CD Projekt). No critical infrastructure confirmed-breach tags in current evidence.

Evidence counts per victim (133 each): Reflect repeated observation across multiple collection cycles, not 133 separate incidents per victim.

No CVEs: Play operators are known to exploit FortiOS and ProxyNotShell vulnerabilities, but no CVE-level enrichment is present in the current pipeline for this cluster. CVE tagging is a known pipeline gap (RR-195).

Closed RaaS model: Unlike open-affiliate RaaS platforms, Play's victim selection is more controlled. Not all observed tool overlap implies Play operation — EDRKillShifter and Cobalt Strike are shared with multiple other actors.