Unit 42 is the Palo Alto Networks threat intelligence and security consulting team. They are a group of cybersecurity researchers and industry experts who use data collected by the company's security platform to discover new cyber threats, such as new forms of malware and malicious actors operating across the world. The group runs a popular
blog where they post
technical reports analyzing active threats and adversaries. Multiple Unit 42 researchers have been named in the MSRC Top 100,
Microsoft's annual ranking of top 100 security researchers. In April 2020, the business unit consisting of Crypsis Group which provided digital forensics, incident response, risk assessment, and other consulting services merged with the Unit 42 threat intelligence team. According to the
FBI, Palo Alto Networks Unit 42 has helped solve multiple
cybercrime cases, such as the
Mirai Botnet and Clickfraud Botnet cases, the LuminosityLink
RAT case, and assisted with "Operation Wire-Wire". In 2018, Unit 42 discovered Gorgon, a hacking group believed to be operating out of Pakistan and targeting government organizations in the United Kingdom, Spain, Russia, and the United States. The group was detected sending
spear-phishing emails attached to infected
Microsoft Word documents using an exploit commonly used by cybercriminals and
cyber-espionage campaigns. In September 2018, Unit 42 discovered Xbash, a
ransomware that also performs
cryptomining, believed to be tied to the
Chinese threat actor "Iron". Xbash is able to propagate like a
worm and deletes databases stored on victim hosts. In October, Unit 42 warned of a new crypto mining malware, XMRig, that comes bundled with infected
Adobe Flash updates. The malware uses the victim's computer's resources to mine
Monero cryptocurrency. In November 2018, Palo Alto Networks announced the discovery of "Cannon", a
trojan being used to target United States and European government entities. The
hackers behind the malware are believed to be
Fancy Bear, the
Russian hacking group believed to be responsible for
hacking the Democratic National Committee in 2016. The malware communicates with its command and control server with
email and uses
encryption to evade detection. In November 2024, Unit 42 released documentation reported to be interview scripts used by North Korean threat actors to gain employment as remote software developers with the goal of planting malware and funneling money back to the government. In April 2026, Palo Alto researchers discovered how AI agents created in Google Cloud's Vertex AI could be used to perform malicious activities due to excessive access. ==References==