Institute for Critical Infrastructure Cybersecurity
Research Initiative

APT Intelligence Directory

A project of the Institute for Critical Infrastructure Cybersecurity (ICIC)

A comprehensive, searchable knowledge base of Advanced Persistent Threats (APTs) and hacker groups, featuring Wikipedia-style profiles with quantitative risk assessments, MITRE ATT&CK mappings, and actionable defensive recommendations.

About the Institute

The Institute for Critical Infrastructure Cybersecurity (ICIC) is an independent, internationally focused research institute. We study the adversaries who compromise power grids, water systems, hospitals, transport networks, and government institutions.

Our work combines traditional threat intelligence with advanced analytical frameworks to produce rigorously verified profiles, campaign reconstructions, and strategic briefings on the world's most consequential hacker groups and APTs.

What We Do

Research, not remediation

ICIC does not sell tools or manage networks. Instead, we operate as an academic think tank and intelligence lab devoted to understanding the adversary. Our internal analytical stack (built on ARCS, ARCF, OmniSynth, the V Framework, and a superior APT and hacker profiling template) transforms open source intelligence, technical telemetry, and historical incident data into evidence-driven research outputs.

Research Outputs

Deep profiles of advanced persistent threats and major hacker groups
Forensic reconstructions of high-impact campaigns
Sector-specific threat briefings for critical infrastructure
Methodological papers on adversary modeling, evidence fusion, and auditability

Who We Serve

Built for decision makers under attack

ICIC's research is designed for organizations and individuals who need adversary-centric insights they cannot easily obtain from vendor marketing or incident after-action reports:

National and local governments
Critical infrastructure operators and regulators
Multilateral and regional organizations
Academic researchers and investigative journalists
Civil society and policy institutes focused on cyber norms and resilience

Why ICIC

Methodology that matches nation-state tradecraft

Multimodal Evidence

Every major conclusion must be supported by more than text, drawing on code artifacts, network telemetry, datasets, images, diagrams, or audio where available.

Crossmodal Corroboration

Claims that cannot be corroborated across modalities are explicitly flagged as provisional and routed into audit workflows.

Risk-Tiered Consensus

High-impact assessments require supermajority consensus under mathematically calibrated thresholds, with dissent preserved in a minority appendix.

Full-Spectrum Provenance

All analytic steps are mapped to machine-readable provenance schemas and cryptographically hashchained logs for auditability.

Directory Features

Comprehensive Coverage

Detailed profiles of 50+ APT groups and threat actors from major nation-state sponsors and criminal organizations.

MITRE ATT&CK Mapping

Full TTP mapping to MITRE ATT&CK framework for standardized threat analysis and defensive alignment.

Quantitative Assessment

Rigorous risk scoring using ARCS, ARCF, and Composite Risk Score frameworks for objective threat prioritization.

Wikipedia-Style Format

Encyclopedic, well-referenced profiles following academic standards for clarity and credibility.

Profile Structure

Each threat actor profile follows a standardized 12-section format ensuring comprehensive coverage and consistency across all entries:

1
Identity & Attribution Intelligence
2
Operational Characteristics
3
Tactics, Techniques & Procedures
4
Arsenal & Tooling Inventory
5
Infrastructure Footprint Analysis
6
Campaign History & Operations
7
Geopolitical & Strategic Context
8
Defense & Mitigation Intelligence
9
Intelligence Confidence Assessment
10
Evolution & Future Trajectory
11
Cross-Reference Network
12
Academic & Professional References

Intelligence Sources

Our threat intelligence is synthesized from authoritative sources including government advisories, leading threat intelligence vendors, academic research, and legal documentation. All profiles are cross-referenced and validated against multiple independent sources.

Legal Notice

ICIC publications and briefings are provided for educational and awareness purposes only. They are based on publicly available information and ICIC's internal analytical frameworks as of the time of writing. They do not constitute operational, legal, or security advice, and ICIC does not accept liability for decisions made based on this material.

Research Inquiries

For academic collaboration, media inquiries, or intelligence-sharing partnerships.

© 2026 Institute for Critical Infrastructure Cybersecurity. All rights reserved.