Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1191

UNC Cluster (Uncategorized)

What is UNC Cluster (Uncategorized)?

UNC Cluster (Uncategorized)A Mandiant tracking label for a set of related intrusions whose actor, motivation, or sponsor has not yet been confirmed enough to graduate to APT or FIN.


UNC stands for Uncategorized and is Mandiant's working designation for activity clusters seen in multiple incidents but not yet attributed with high confidence. A UNC is built from technical overlap (malware, command-and-control, infrastructure, code styling, TTPs, victimology). When confidence and corroboration are sufficient, a UNC can graduate to an APT (espionage), FIN (financial), or a thematic name; otherwise it may be merged into another cluster or split. UNC numbering provides a stable reference for shared intelligence without requiring premature attribution. Microsoft uses similar provisional names like DEV-#### (now Storm-####) for the same purpose. UNC4841 (China-linked, Barracuda ESG zero-day in 2023) is a well-known example.

Examples

  1. 01

    UNC4841 was reported in 2023 as exploiting the Barracuda Email Security Gateway zero-day (CVE-2023-2868) against governments worldwide.

  2. 02

    UNC2452 was the original Mandiant designation for the actor behind the SolarWinds compromise, later linked to APT29.

Frequently asked questions

What is UNC Cluster (Uncategorized)?

A Mandiant tracking label for a set of related intrusions whose actor, motivation, or sponsor has not yet been confirmed enough to graduate to APT or FIN. It belongs to the Defense & Operations category of cybersecurity.

What does UNC Cluster (Uncategorized) mean?

A Mandiant tracking label for a set of related intrusions whose actor, motivation, or sponsor has not yet been confirmed enough to graduate to APT or FIN.

How does UNC Cluster (Uncategorized) work?

UNC stands for Uncategorized and is Mandiant's working designation for activity clusters seen in multiple incidents but not yet attributed with high confidence. A UNC is built from technical overlap (malware, command-and-control, infrastructure, code styling, TTPs, victimology). When confidence and corroboration are sufficient, a UNC can graduate to an APT (espionage), FIN (financial), or a thematic name; otherwise it may be merged into another cluster or split. UNC numbering provides a stable reference for shared intelligence without requiring premature attribution. Microsoft uses similar provisional names like DEV-#### (now Storm-####) for the same purpose. UNC4841 (China-linked, Barracuda ESG zero-day in 2023) is a well-known example.

How do you defend against UNC Cluster (Uncategorized)?

Defences for UNC Cluster (Uncategorized) typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for UNC Cluster (Uncategorized)?

Common alternative names include: UNC group, Uncategorized cluster.

Related terms