Tagged threat-actor-identification