1.5 Explain different threat actors, vectors, and intelligence sources Flashcards

1
Q

Advanced Persistent Threat or APT
(Actors and threats)

A

As defined in the NIST (National Institute of Standards and Technology) SP 800-39, An APT is “An adversary that possesses sophisticated levels of expertise and significant resources which allow it to create opportunities to achieve its objectives by using multiple attack vectors (cyber, physical, and deception)”

The APT: (i) pursues its objectives repeatedly over an extended period of time, (ii) adapts to defenders’ effort to resist it; and (iii) is determined to maintain the level of interaction needed to execute its objectives.

  • Level of sophistication/capability:
    Highly skilled and tools are advanced tools not just available on the internet

*Resources/funding: Significant resources

*Intent/motive: The motive could be political or economic. In some cases, the attack is done for traditional espionage goals: to gather information about the target’s defense capabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insider threats (Actors and threats)

A

Insider attacks occur when an employee, contractor, vendor, or other individual, with authorized access to information and systems uses that access to wage an attack against the organization. These attacks are often aimed at disclosing confidential information, but insiders may also seek to alter information or disrupt business processes.

  • Level of sophistication/capability:
    An insider can be of any skill level. They could be script kiddie or very technically skilled.

*Resources/funding: Limited funding and time, but since they are insiders that gives them an advantage with the organizations’ network and some level of knowledge.

*Intent/motive: Motives can range from activists goals to financial goals to simply being upset with not getting a promotion or anything in that manner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

State actors (Actors and threats)

A

State actors are generally the top-tier cyber threat actors, and they bring a level of sophistication that, when executed well, allows them to be an APT.

Nation-state actors are highly skilled, well-funded, and motivated to use cyber tools, techniques, and procedures to gain a certain end state —– whether it be the exfiltration of another country’s sensitive data, the disruption of an adversary’s electrical grid, intellectual property theft, election interference, or even a denial-of-service (DoS) attack targeting multinational banking systems.

  • Level of sophistication/capability:
    Highly skilled, allows them to be an APT.

*Resources/funding: well-funded

*Intent/motive: Motivated to use cyber tools, techniques, and procedures to gain a certain end state—-whether it be the exfiltration of another country’s sensitive data, the disruption of an adversary’s electrical grid, intellectual property theft, election interference, or even a denial-of-service (DoS) attack targeting multinational banking systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacktivists (Actors and threats)

A

Hacktivists use hacking techniques to accomplish some activist goal.

  • Level of sophistication/capability:
    Range from script kiddies to quite skilled to highly skilled

*Resources/funding: The resources of hacktivists also vary somewhat. Many are working alone and have very limited resources. Large groups will always have more time and other resources than a lone attacker.

*Intent/motive: They are motivated by the greater good, even if their activity violates the law.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Script Kiddies (Actors and threats)

A

The term Script kiddie is a derogatory term for people who use hacking techniques but have limited skills.

  • Level of sophistication/capability:
    These attackers often have little knowledge of how their attacks actually work, and they are simply seeking out convenient targets of opportunity.

*Resources/funding: These individuals tend to be rather young, they work alone, and they have very few resources.

*Intent/motive: The motivations of script kiddies revolve around trying to prove their skill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Criminal Syndicates (Actors and threats)

A

Otherwise known as organized crime, criminal syndicates are exactly what they sound like: the extension of classic crime techniques into cyberspace to extort, harass, or otherwise pursue illegal ends.

  • Level of sophistication/capability:
    Organized crime tends to have attackers who range from moderately skilled to highly skilled.

*Resources/funding: Organized group crimes tend to have more resources.

*Intent/motive: The motive is simply illegal financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hackers (Actors and threats)

A

Hackers often are depicted as wearing different colors of “hats” depending on their intent and motivation.

Authorized or White-hat hackers, are those who act with authorization and seek to discover security vulnerabilities with the intent of correcting them. White-hat attackers may either be employees of the organization or contractors hired to engage in penetration testing.

Unauthorized or Black-hat hackers, also known as unauthorized attackers, are those with malicious intent. They seek to defeat security controls and compromise the confidentiality, integrity, or availability of information and systems for their own, unauthorized, purposes.

Semi-authorized attackers or Gray-hat attackers, are those who fall somewhere between white- and black-hat hackers. They act without proper authorization, but they do with the intent of informing their targets of any security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT (Actors and threats)

A

Shadow IT refers to networks and systems that are managed outside of the IT organization, often without the IT organization’s permission or even awareness. Shadow IT often does not meet security requirements, which is often why it is stood up “in the shadows” to begin with and can pose a serious vulnerability to the larger architecture, especially if it’s connected to the managed environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Competitors (Actors and threats)

A

Competitors may engage in corporate espionage designed to steal sensitive information from your organization and use it to their own business advantage.

This may include theft of customer information, stealing proprietary software, identifying confidential product development plans, or gaining access to any other information that would benefit the competitor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Internal/External (Attributes of actors)

A

Very simply, actors can be internal, such as a disgruntled employee, or external, such as a competing company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Level of sophistication/capability (Attributes of actors)

A

On a spectrum from the most unskilled individual to a highly technical team able to exploit niche systems and applications, often through zero-day attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Resources/funding (Attributes of actors)

A

On a spectrum of no funding to a full nation-state level budget similar to other weapons program development.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Intent/motivation (Attributes of actors)

A

Varies widely across poor behaviors, curiosity, fame, organizational disgruntlement, political causes, to national-level intelligence gathering , etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vector

A

A threat vector describes the actual means by which a threat is realized.

Direct access —– Ex. Dumpster Diving

Wireless —– Ex. Wardriving

E-mail —– Ex. Phishing

Supply chain —– Ex. Compromised supplier
or contractor

Social media —– Ex. Eliciting information

Removable media —- Malicious USB drive

Cloud —- Ex. Denial-of-Service against cloud provider

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Open-source intelligence or OSINT (Threat intelligence sources)

A

Open-source intelligence or OSINT is threat intelligence that is acquired from publicly available sources.

Many organizations have recognized how useful open sharing of threat information can be, and open source threat intelligence has become broadly available. In fact, now the challenge is often around deciding what threat intelligence sources to use, ensuring that they are reliable and up-to-date and leveraging them well.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Closed/proprietary (Threat intelligence sources)

A

Closed or proprietary databases are managed by companies who curate and sell the information or analysis as a service to subscribers.

17
Q

Vulnerability databases (Threat intelligence sources)

A

As new vulnerabilities are discovered, they are cataloged into publicly available databases, such as the National Vulnerability Database (NVB) operated by the NIST.

Each vulnerability is assigned a unique identifier and identification across scanning and reporting platforms.

18
Q

Public/private information sharing centers (Threat intelligence sources)

A

Threat intelligence communities have been created to share threat information. In the United States, organizations known as Information Sharing and Analysis Centers (ISACs) help infrastructure owners and operators share threat information and provide tools and assistance to their members.

19
Q

Dark web (Threat intelligence sources)

A

The dark web is a network run over standard Internet connections but using multiple layers of encryption to provide anonymous communication. Hackers often use sites on the dark web to share information and sell credentials and other data stolen during their attacks.

20
Q

Indicators of Compromise or IoCs (Threat intelligence sources)

A

Threat intelligence sources may also provide indicators of compromise (IoCs). These are the telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers. IoCs may also be found in file and code repositories, that offer threat intelligence information.

21
Q

Automated Indicator Sharing or AIS (Threat intelligence sources)

A

Automated Indicator Sharing (AIS) is a service the Cybersecurity and Infrastructure Security Agency (CISA) provides to enable real-time exchange of machine-readable cyber threat indicators and defensive measures between public and private-sector organizations. AIS helps to protect the participants of the service and ultimately reduce the prevalence of cyberattacks.

22
Q

Structured Threat Information eXpression STIX (Automated Indicator Sharing or AIS)

A

Structured Threat Information eXpression or STIX is an XML language originally sponsored by the U.S Department of Homeland Security.

23
Q

Trusted Automated eXchange of Intelligence Information TAXII (Automated Indicator Sharing or AIS)

A

TAXII is intended to allow cyber threat information to be communicated at the application layer via HTTPS. TAXII is specifically designed to support STIX data exchange.

24
Q

Predictive analysis (Threat intelligence sources)

A

The use of all of these data sources, and any more that can provide content and context, to deal with events more swiftly and even proactively predict events before they can occur.

25
Q

Threat maps (Threat intelligence sources)

A

Threat maps are “live” graphical displays of a subset of cyberattacks that are occurring; generally they are provided by security vendors and are meant to depict the tremendous number of malicious activities that they are continuously protecting their subscribers from.

26
Q

File/code repositories

A

Code repositories, such as GitHub, are a lifesaver for a developer who is looking to quickly churn out a product under a tight deadline facilitating project development across geographically dispersed teams using public/private repositories.

Developers write their code in their private repository and then commit it to the public repository when complete.

The ability to download and study the open-source code is helpful to an intelligence analyst looking to find vulnerabilities specific to the code, as well as potential information about the developers and their published code.

27
Q

Research Sources

A

As a security professional, you should continue to conduct your own research into emerging cybersecurity threats.

  • Vendor websites
  • Vulnerability feeds
  • Conferences
  • Academic journals
  • Request for comments (RFCs) = RFC documents are particularly informative because they contain the detailed technical specifications for Internet protocols
  • Local industry groups
  • Adversary Tactics, Techniques, and Procedures (TTPs)
28
Q
A