Energetic Bear, Dragonfly - Threat Group Cards: A Threat Actor Encyclopedia Archived: 2026-04-05 14:54:10 UTC Home > List all groups > Energetic Bear, Dragonfly APT group: Energetic Bear, Dragonfly Names Energetic Bear (CrowdStrike) Dragonfly (Symantec) Crouching Yeti (Kaspersky) Group 24 (Talos) Koala Team (iSight) Iron Liberty (SecureWorks) TG-4192 (SecureWorks) Electrum (Dragos) ATK 6 (Thales) ITG15 (IBM) Bromine (Microsoft) Ghost Blizzard (Microsoft) Blue Kraken (PWC) G0035 (MITRE) Country Russia Sponsor State-sponsored, GRU Motivation Sabotage and destruction First seen 2010 Description Dragonfly is a cyberespionage group that has been active since at least 2011. They initially targeted defense and aviation comp sector in early 2013. They have also targeted companies related to industrial control systems. According to Kaspersky, Crouching Yeti has been operating since at least 2010 and has infected roughly 2,800 targets in 38 co education and pharmaceuticals. A similar group emerged in 2015 and was identified by Symantec as Berserk Bear, Dragonfly 2.0. There is debate over the ext and Dragonfly 2.0, but there is sufficient evidence to lead to these being tracked as two separate groups. Observed Sectors: Aviation, Construction, Defense, Education, Energy, Industrial, IT, Manufacturing, Oil and gas, Pharmaceutical. Countries: Canada, France, Germany, Greece, Italy, Norway, Poland, Romania, Russia, Serbia, Spain, Turkey, UK, Ukraine, U Tools used Commix, CrackMapExec, Dirsearch, Dorshel, Goodor, Havex RAT, Hello EK, Heriplor, Impacket, Industroyer, Inveigh, Karag PHPMailer, PsExec, SMBTrap, sqlmap, Subbrute, Sublist3r, Sysmain, Wpscan, WSO. Operations performed Feb 2013 Spam campaign The Dragonfly group has used at least three infection tactics against targets in the energy sector. The earliest met campaign, which saw selected executives and senior employees in target companies receive emails containing a emails had one of two subject lines: “The account” or “Settlement of delivery problem”.