top of page
  • Facebook
  • LinkedIn
Search

Microsoft plans a naming system for hackers

What’s in a name? Well, a lot, if you’re talking cyber crime. Different groups go by different names, and it’s making attacks harder to respond to. A fix is on the way…

Ever tried to follow a show where the main villain had four different names?

 

Seems impossible, doesn't it?

 

Yet, that's the current state of the cyber security world.

 

A single hacking group might be identified by various names, depending on who is reporting on them. Be it Microsoft, Google, CrowdStrike, or any other security company.

 

This leads to confusion. Even worse, it can delay the response time of experts and the businesses they protect during a cyber attack.

 

This is why Microsoft and CrowdStrike are collaborating to resolve this issue.

 

They have announced a plan for a new, standardized naming system for hacking groups. Imagine it as assigning one agreed-upon label to each cyber criminal group. It’s not merely about organizing the names; it’s about simplifying the process of identifying attackers, understanding their methods, and stopping them.

 

Currently, if a hacking group is targeting businesses like yours, Microsoft might refer to them as Salt Typhoon, while another security company might call the same group GhostEmperor or OPERATOR PANDA.

 

If you're unaware that these are the same threat, it’s easy to miss the complete picture. And that’s a significant issue when every moment is crucial during a cyber attack.

 

Microsoft's new naming system will categorize these groups by type and origin using weather-themed terms. For instance, Chinese state-backed groups will have “Typhoon” in their name, Russian ones will have “Blizzard.” Other attackers like ransomware gangs or commercial spyware developers will be labeled with terms like “Tempest,” “Storm,” or “Tsunami.”

 

It’s a straightforward yet powerful concept.

 

And it’s more significant for your business than you might realize.

 

The clearer cyber threats are identified and communicated, the quicker your IT team or cyber security provider can detect patterns and act. This means enhanced threat intelligence, fewer missed alerts, and a more robust, rapid response when something suspicious arises.

 

In the end, such collaboration among major players like Microsoft, CrowdStrike, Google, and others helps level the playing field for smaller businesses. You don’t need to be a cyber security expert to benefit. Just knowing that everyone is on the same page when a threat occurs can make a significant difference.

 

This is one of those behind-the-scenes changes that might not make headlines but could greatly impact keeping your business secure. It’s another step towards making cyber security less chaotic and much more effective.

 

Need assistance in better protecting your business from cyber attacks? Reach out to us.  

 

 
 
 

Comments


 Address. 5a Telford Close, Aylesbury, Bucks, HP19 8DS

 Address. 28a The Forum, North Hykeham, Lincoln, LN6 8HW 

Tel: 01280 730004

Tel: 01522 454020

© 2025 by Blue Tree IT & Communications. 

bottom of page