Volume without priority
Thousands of alerts a day, all with similar severity. Without profiling, the SOC team treats mass spam and CFO-targeted spear-phishing the same way.
Most SOC teams close alerts. Few know who is behind them. Threat Actor Profiling turns generic incidents — phishing, malware, cloud attacks — into adversary knowledge: MITRE-mapped TTPs, observed infrastructure, victimology, attribution with explicit confidence level.
An alert closed without knowing who triggered it is a lost learning opportunity. Repeated thousands of times a year, it becomes the reason defences do not improve despite growing investment.
Thousands of alerts a day, all with similar severity. Without profiling, the SOC team treats mass spam and CFO-targeted spear-phishing the same way.
The same technical vector (e.g. a phishing email) can be random spam or an attack prepared over weeks. Without attribution, the difference does not surface.
Without knowing who is attacking, controls are applied indiscriminately: block everything, alert on everything, log everything. Result: noise, fatigue, rising costs, and defensive ROI dropping.
Generic threat intelligence describes the landscape. Threat actor profiling identifies the operational adversary of the specific organisation, based on its real incidents and victimology.
It is not a mystical process. It is a documentable technical pipeline, applicable to every incident of meaningful relevance. The result always includes an explicit confidence level — even when evidence is not enough to attribute, Fortgale says so.
Extraction and forensic preservation of every artefact: payloads, IPs, domains, hashes, full email headers, endpoint logs, network telemetry. No containment action until IOCs have been consolidated.
Mapping observed TTPs on the MITRE ATT&CK framework and comparing them with profiles of threat actors already tracked by the CTI team. Identification of overlap across tactic, technique, sub-technique.
Analysis of C2 infrastructure (ASN, registrar, hosting patterns, TLS fingerprints), tooling (loaders, RATs, packers), malware code (similarity hashing, language artefacts) and victimology (sector, geography, size).
Formulation of explicit attribution with a confidence level (high / medium / low / insufficient). When evidence is insufficient, the most likely hypotheses are stated without overreach. Rushed attribution is a widespread bad practice in commercial CTI — Fortgale does not engage in it.
Three vectors cover over 90% of the incidents observed: phishing, malware, cloud attacks. For each, a specific attribution methodology.
A phishing email is rarely an isolated event. Fortgale analyses the kit used (Tycoon 2FA, Mamba 2FA, Caffeine, EvilProxy, NakedPages, W3LL, Greatness), the landing page architecture, the delivery infrastructure (registrar, ASN, certificate fingerprint), the victimisation pattern and the operator behind the campaign — kits are not all used in the same way.
For the Board: attributing an AiTM campaign to a specific operator translates into 2-4 targeted controls (conditional access policy, FIDO2 hardware for top targets, geo-fencing, IdP-side detection rules) — not 1,000 emails to analyse manually.
A piece of malware is not just a hash to block. Fortgale analyses code similarity (BinDiff, ssdeep, TLSH, Vector35 reuse), packers and crypters chosen, C2 protocols (custom or known framework), persistence patterns, language artefacts (comments, debug paths, PDB, encoding), PE timestamps and compilation times. Every technical choice narrows the circle of likely authors.
For the Board: distinguishing a commodity loader sold on forums from a custom, targeted malware radically changes the required response level — generic vs custom is the difference between patching and full DFIR.
Cloud attacks are the fastest-growing vector — and the one where most CTI vendors are least prepared. Fortgale tracks IAM enumeration patterns, OAuth consent abuse, token theft chains, cloud-native persistence (federated identity backdoor, hidden service principal, app registration sleeper) and exfiltration through legitimate APIs.
For the Board: an attributed OAuth consent abuse translates into 3 concrete controls (admin consent workflow, app governance policy, conditional access for non-verified apps) — tools already present in Microsoft tenants, only to be properly configured.
Three actors tracked and attributed by the Fortgale CTI team with research published on the blog. One global Initial Access Broker. Three of the most active ransomware groups against Europe in 2024-2026. These are the kind of dossiers a customer receives.
Multi-stage campaign attributed to Mora_001. The Fortgale IR team tracked it internally as FortiSync Quasar: Fortinet exploitation, Matanbuchus 3.0 deployment, Astarion RAT and SystemBC. Evolution from ransomware operations to pure espionage. Exfiltration blocked.
Advanced cyber-espionage group with primary focus on the European banking sector. MFA bypass via AiTM, infrastructure distributed across regional registrars, social engineering prepared with extensive OSINT. Significant resources behind the operation.
Tracked by Fortgale since March 2022: European actor with internally developed malware (BrokerLoader). Rare case of a local actor with custom offensive capabilities. Documented exclusively by Fortgale CTI.
USB worm that evolved into a top-tier Initial Access Broker for ransomware groups (LockBit, Akira, Clop). Distinctive pattern: msiexec chained with regsvr32, abuse of rundll32 via fodhelper.exe, Tor onion C2, follow-on downloaders for FakeUpdates, IcedID, Bumblebee. EU telemetry growing through 2025-2026.
Emerged in early 2024 after the collapse of ALPHV/BlackCat, RansomHub quickly absorbed high-level affiliates (including the one behind the Change Healthcare case). Linux/ESXi/Windows builders, proprietary exfiltration tooling, Tor leak site. Top by EU enterprise impact in 2024-2025.
Active since March 2023, Akira has maintained a high victimisation cadence through 2024-2026 with a focus on the European mid-market. Dominant initial vector: exploitation of non-MFA VPN appliances (Cisco ASA, SonicWall SSLVPN, known unpatched vulnerabilities). Effective ESXi encryptor, "Akira Dark Site" leak site on Tor with 80s aesthetics.
Medusa stands out for aggressive negotiation (public countdown on the leak site with rising ransom demand) and for intensive use of BYOVD (Bring Your Own Vulnerable Driver) to disable EDR. Strong presence in the EU public sector through 2024-2025, with documented incidents at municipalities, regional health authorities, schools.
Rushed attribution is one of the most widespread problems in commercial CTI. Fortgale explicitly declares the confidence level of every attribution — and admits when evidence is insufficient.
Overlap across at least 3 independent elements: C2 infrastructure, malware code, MITRE TTPs, victimology, language artefacts. Documented attribution in the report.
Overlap on 1-2 elements, with partial evidence on the rest. Attribution formulated as the most likely hypothesis, with missing elements stated.
A single element of overlap (e.g. one shared IOC). The most likely hypothesis is indicated alongside less likely alternatives. This is not yet attribution.
Fortgale explicitly states that evidence is not enough. The team shares the data collected and observed TTPs, but does not force attribution. Rare among vendors — standard practice here.
Four concrete deliverables — not just a report to archive, but operational material to apply to the SOC, SIEM, endpoints, and Board.
Structured document with MITRE-mapped TTPs, IOCs, C2 infrastructure, tooling, victimology, attribution and confidence level. Technical and executive versions in English and Italian.
SIGMA rules for SIEM, YARA for static/dynamic analysis, Snort/Suricata for IDS, custom rules for the customer's MDR platforms.
Concrete list of controls to implement based on the profiled actor: conditional access policy, infrastructure blocks, MFA enforcement on target assets, app consent governance, and more.
Live session with the analysts for the SOC/IR team (technical deep-dive) and a separate session for CISO/Board (business impact, risk, required decisions).
If the organisation has a limited attack surface and only suffers low-volume opportunistic attacks, threat actor profiling is oversized compared to the value generated. In those cases a standard IOC feed and perimeter protection service is more efficient.
TA profiling becomes critical when: ① the organisation has high-value assets (intellectual property, sensitive data, critical infrastructure); ② operates in target sectors (finance, manufacturing, energy, healthcare, public sector, defence); ③ has already suffered incidents with specific-targeting signals (prior reconnaissance, payload personalisation, attack on top management).
Not sure? Let's talk. If you don't need it, Fortgale will say so.
An actor profile does not stay in a PDF. It feeds the SOC, accelerates IR, expands the MDR control set.
Every newly profiled TA generates SIGMA, YARA, and custom MDR rules distributed to the SOC. The SOC applies them in real time to every monitored customer.
Discover the SOC →The Fortgale MDR does not rely solely on EDR vendor rules: it enriches them with profiles of active threat actors, lifting detection rates and reducing false positives.
Discover MDR →During an incident, knowing who is attacking accelerates containment and remediation: anticipate the next moves, block typical exfiltration patterns, brief the Board with data.
Contact the IR team →Threat Intelligence Feed STIX/TAXII · Vertical advisories · Executive Briefing · Deep & Dark Web · Attack Surface Management · Brand & Social Intelligence. Threat Actor Profiling is capability 01 of 7.
See all capabilities →The CISO reads this page. Then has to explain it in 5 minutes to a Board of Directors that does not speak MITRE. Fortgale prepares it.
How many profiled attacks the organisation has faced in the last 6 months · how many targeted vs opportunistic · trend.
Who is attacking (profiled clusters) · why (motivation · victimology) · explicit confidence level.
Expanded control set · estimated cost · expected impact · implementation timeline · residual risk.
The "3 Board slides" pack is included in every Executive Briefing · also available on request.
Generic threat intelligence describes the threat landscape in the abstract (famous groups, sectors at risk, trends). Threat actor profiling identifies who is actually attacking a specific organisation, based on its real incidents, attack surface, and victimology. The first informs the CISO; the second drives concrete defence decisions.
Through behavioural indicators: pre-attack reconnaissance on the target (LinkedIn, OSINT), payload personalisation (logo, persona, customer context), timing (target office hours), preferred vectors (CFO, HR, IT admin). A generic attack treats the victim as just another IP; a targeted one treats them as an asset. The difference weighs heavily on response priority.
Yes. The Fortgale CTI team produces on-demand profiles of single threat actors when a customer suspects or suffers an attack from a specific group. The profile includes MITRE-mapped TTPs, observed infrastructure, tooling, victimology, associated IOCs, and dedicated detection rules (SIGMA, YARA). Typical delivery time: 3-10 days depending on complexity.
Four levels: High (multiple independent corroborating technical evidences — infrastructure, code, TTPs, victimology), Medium (some evidence with missing or ambiguous elements), Low (single overlap element, most likely hypothesis), Insufficient (evidence inadequate for attribution — stated explicitly). Fortgale does not force attribution where evidence falls short.
When the organisation has a limited attack surface and only suffers low-volume opportunistic attacks, TA profiling is oversized compared to the value generated. In those cases a standard IOC feed and perimeter protection service is more efficient. TA profiling becomes critical when the organisation has high-value assets, operates in target sectors (finance, manufacturing, energy, healthcare, public sector) or has already suffered incidents with specific-targeting signals.
A first-level profile (TTPs + IOCs + infrastructure) typically takes 3-7 days. A complete profile with documented technical attribution, tooling analysis, and victimology takes 2-4 weeks. For actors already in the Fortgale database (180+) the profile is available in 24-48 hours. For unknown actors, it depends on the quantity and quality of evidence collected.
Bring a recent incident — phishing, malware, suspicious cloud access. The Fortgale CTI team will produce a free mini-profile within 5 business days. No commitment: just evidence.
No nurturing sequences, no auto-replies. One of our analysts calls you back within one business day.
The full Report (executive summary · operational IoCs · technical runbook) is restricted. Share two details and one of our analysts contacts you with access and a short technical briefing.
Response in 30 minutes, containment in 1–4 hours. Even if you are not a Fortgale customer.