Palo Alto Networks’ Unit 42 threat research team has introduced a groundbreaking systematic approach to threat actor attribution, addressing longstanding challenges in cybersecurity intelligence analysis.
The Unit 42 Attribution Framework, unveiled on July 31, 2025, transforms what has traditionally been considered “more art than science” into a structured methodology for analyzing and categorizing cyber threats.
The framework addresses critical gaps in threat intelligence by providing a three-tiered classification system that progresses from initial activity observation to definitive threat actor identification.
Unlike conventional approaches that rely heavily on individual researcher expertise, this methodology integrates the Diamond Model of Intrusion Analysis with the Admiralty System to create standardized scoring mechanisms for reliability and credibility assessment.
Cybersecurity professionals have long struggled with inconsistent threat group naming conventions and premature attribution decisions that can lead to misdirected defensive resources.
The Unit 42 Attribution Framework – three levels of tracked activity (Source – Palo Alto Networks)
The new framework establishes clear criteria for each attribution level, requiring multiple corroborating sources and comprehensive analysis before elevating threats through the classification hierarchy.
Palo Alto Networks analysts identified the need for this systematic approach after observing widespread confusion in threat actor nomenclature across the cybersecurity community.
The framework applies rigorous standards across seven key threat data categories: tactics, techniques and procedures (TTPs), tooling configurations, malware code analysis, operational security consistency, timeline analysis, network infrastructure, and victimology patterns.
The attribution process begins with activity clusters, designated with the prefix “CL-” followed by motivation indicators such as STA for state-sponsored, CRI for crime-motivated, or UNK for unknown motivation.
These clusters require at least two related events sharing indicators of compromise, similar TTPs, or temporal proximity. For example, multiple phishing campaigns targeting financial institutions with identical SHA256 hashes would constitute a qualifying activity cluster.
Advanced Technical Implementation and Case Study Analysis
The framework’s technical sophistication becomes evident in its elevation criteria for temporary threat groups, which require a minimum six-month observation period and comprehensive Diamond Model mapping across all four vertices: adversary, infrastructure, capability, and victim.
Temporary threat groups receive “TGR-” prefixes with identical motivation tagging systems.
The methodology incorporates advanced infrastructure analysis techniques, examining not merely IP addresses and domains but the relationships between infrastructure elements, including shared hosting providers and registration patterns.
Code similarity analysis extends beyond simple hash comparisons to examine structural functionality, shared libraries, and unique characteristics that indicate common development sources.
Example Attribution Scoresheet Elements:
Source Reliability: A-F scale (A=Reliable, F=Unknown)
Information Credibility: 1-6 scale (1=Confirmed, 6=Uncertain)
Default IoC Scores: IP addresses (4), File hashes (2), Domains (3)
The framework’s practical application is demonstrated through the decade-long analysis of Stately Taurus activity, which began with the 2015 discovery of Bookworm Trojan.
Unit 42 researchers employed SHA256 hash analysis to map infrastructure connections between seemingly disparate campaigns, ultimately establishing definitive links through the new attribution methodology in 2025.
The framework includes sophisticated operational security analysis, tracking consistent threat actor mistakes such as code typos, developer handles in metadata, and open infrastructure configurations.
These “OPSEC fingerprints” provide valuable attribution evidence when combined with temporal correlation analysis and geopolitical event mapping.
This systematic approach represents a significant advancement in threat intelligence maturation, offering transparency in attribution decisions while establishing reproducible methodologies that enhance collaborative threat research across the cybersecurity community.
Integrate ANY.RUN TI Lookup with your SIEM or SOAR To Analyses Advanced Threats -> Try 50 Free Trial Searches
The post Unit 42 Unveils Attribution Framework to Classify Threat Actors Based on Activity appeared first on Cyber Security News.