2023 was another very active active year in the threat intel space with more threats and higher impact threats than ever. It was also a big year for Augur threat infrastructure predictions, with over 52,000 CIDRs (1.17 million IPs) predicted malicious and 310,000 IPs belonging to 28,000 CIDRs confirmed malicious by third parties. 

Those are big numbers that put into context the impact that Augur can have on your security posture. Just to illustrate that impact, our Augur platform predicted over 100 IPS related to the MOVEit vulnerability providing unique advance protection against this novel threat. But with over a million IPs predicted this year, Augur is way more than protection against the major threats that make the news. 

Let's take a look at some of the most active threats Augur predicted and protected against in 2023.

Top Identifiers and Most Active Threat Actor Groups

Here are the top 5 most detected threat identifiers (based on 3rd party confirmations) and the 5 threat actor groups who set up the most attack infrastructure in 2023.

Spoiler alert: Redline Stealer and Naikon each take the prize in their respective categories by some margin.

                                         2023 Top Identifiers in Confirmed Predictions 
Indentifier  Confirmed IPs
 Redline Stealer (Info stealer) 2033 
 Amadey (Trojan) 933 
 Smoke Loader (Malware loader) 771
 Dark Crystal RAT (aka DCrat - remote access tool) 489 
 APT29 (Russian, likely state-sponsored) 425                   
                                         2023 Most Active Threat Actor Groups (Infrastucture) 
Threat Actor Group  CIDRs
 Naikon (Chinese, aka APT 30, Goblin Panda, etc.) 149
 Roaming Mantis (Ransomware campaign) 63
 Killnet (Russian APT) 59
 Turla (Russian APT) 44 
 Group8 (Cybercriminal group exploiting Magecart)  24                   

Most Active Threat Groups (Infrastructure)

Every year research team surfaces the Threat Actor Groups that Augur has identified as commissioning the most new attack infrastructure, and we share what we’ve learned with the security community. Knowing which groups are setting up attack infrastructure allows you to understand which groups are ramping up and gives time to understand their TTPs and be proactive in your defense strategies. Forewarned Is forearmed.

How Does Augur Do That?

Augur uses behavioral modeling to detect the buildup of cybercriminal infrastructure online before attacks. We identify thousands of malicious IPs, IP ranges, and domains every month. Augur predicts attacks on average 50 days before they are first reported. Our predictions are highly accurate, with a low false-positive rate of 0.01%, giving Augur clients a heads up on cyberattacks, zero-days, and novel threats.

Your Early Warning System

Augur is your best early warning system and your insurance policy against novel threats.

Recently, Augur predicted major elements of the MOVEit, Solar Winds, Log4JShell, Colonial Pipeline and ProxyNotShell hacks months ahead of first reports.

Find Out More

Curious to see how Augur works and how Augur’s predictive intelligence can improve your Patient Zero protection and overall security posture? You can learn more about how Augur works and how it solves real-world security problems. If you want to talk to someone about how Augur’s predictive intelligence can improve your overall security posture, email us at augur@seclytics.com.

Talk to an Expert
TAKE THE CHALLENGE
Talk to an Expert
Get a Demo