Threat Actor Characterization
AZURITE
ID: 153d791e129374536ec34f381edd35d777718Actor Network Graph
Open Network GraphMITRE ATT&CK®
AZURITE is a China-linked OT-focused threat cluster publicly disclosed in 2026 and assessed to overlap with activity also tracked under labels such as Flax Typhoon, Ethereal Panda, and UNC5923. Public reporting indicates that it exploits exposed edge infrastructure, pivots toward engineering workstations, and exfiltrates OT-relevant operational data including network diagrams, alarm data, PLC configuration material, and HMI-related information.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1090 | Proxy | TA0011 | |
| T1218 | System Binary Proxy Execution | TA0005 |
|
| T1082 | System Information Discovery | TA0007 |
|
| T1046 | Network Service Discovery | TA0007 |
|
| T0802 | Automated Collection | TA0100 |
|
| T0840 | Network Connection Enumeration | TA0102 |
|
| T1005 | Data from Local System | TA0009 |
|
| T1041 | Exfiltration Over C2 Channel | TA0010 |
|
AZURITE — China-linked OT reconnaissance and pre-positioning cluster
Classification: TLP:WHITE - Open Source Intelligence (OSINT)
Category: Cyber-espionage / OT intrusion preparation - Origin: China (assessed, medium confidence)
Author: iQBlack CTI Team
Executive Summary
AZURITE is a newly publicized OT-focused threat group disclosed by Dragos in February 2026. Public reporting describes the cluster as China-linked and assessed to overlap in part with activity that other vendors have tracked under labels such as Flax Typhoon, Ethereal Panda, and UNC5923. The currently visible pattern is not one of overt industrial disruption, but of targeted collection inside OT-adjacent environments, particularly engineering workstations and related operational assets.
Observed activity suggests a disciplined reconnaissance-and-preparation model. AZURITE reportedly exploits public-facing infrastructure, including small-office/home-office (SOHO) devices and other edge systems, builds proxy and pivot paths, reaches OT-relevant assets, and exfiltrates data such as alarm information, network diagrams, PLC configuration material, and HMI-related data. This makes the cluster strategically important even in the absence of confirmed destructive operations.