2.1 Threat Actors Flashcards

1
Q

Threat Actors

A

The entity responsible for an event that has an impact
on the safety of another entity
– Also called a malicious actor
* Threat actor attributes
– Describes characteristics of the attacker
* Useful to categorize the motivation
– Why is this attack happening?
– Is this directed or random?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attributes of threat actors

A

Internal/external
– The attacker is inside the house
– They’re outside and trying to get in
* Resources/funding
– No money
– Extensive funding
* Level of sophistication/capability
– Blindly runs scripts or automated vulnerability scans
– Can write their own attack malware and scripts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Motivations of threat actors

A

What makes them tick?
– There’s a purpose to this attack
* Motivations include
– Data exfiltration
– Espionage
– Service disruption
– Blackmail
– Financial gain
– Philosophical/political beliefs
– Ethical
– Revenge
– Disruption/chaos
– War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Nation states

A

External entity
– Government and national security
* Many possible motivations
– Data exfiltration, philosophical, revenge, disruption,
war
* Constant attacks, massive resources
– Commonly an Advanced Persistent Threat (APT)
* Highest sophistication
– Military control, utilities, financial control
– United States and Israel destroyed 1,000 nuclear
centrifuges with the Stuxnet worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unskilled attackers

A

Runs pre-made scripts without any knowledge of what’s
really happening
– Anyone can do this
* Motivated by the hunt
– Disruption, data exfiltration, sometimes philosophical
* Can be internal or external
– But usually external
* Not very sophisticated
– Limited resources, if any
* No formal funding
– Looking for low hanging fruit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivist

A

A hacker with a purpose
– Motivated by philosophy, revenge, disruption, etc.
* Often an external entity
– Could potentially infiltrate to also be an insider threat
* Can be remarkably sophisticated
– Very specific hacks
– DoS, web site defacing, private document release
* Funding may be limited
– Some organizations have fundraising options

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider threat

A

More than just passwords on sticky notes
– Motivated by revenge, financial gain
* Extensive resources
– Using the organization’s resources against themselves
* An internal entity
– Eating away from the inside
* Medium level of sophistication
– The insider has institutional knowledge
– Attacks can be directed at vulnerable systems
– The insider knows what to hit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Organized crime

A

Professional criminals
– Motivated by money
– Almost always an external entity
* Very sophisticated
– Best hacking money can buy
* Crime that’s organized
– One person hacks, one person manages the exploits,
another person sells the data, another handles
customer support
* Lots of capital to fund hacking efforts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Shadow IT

A

Going rogue
– Working around the internal IT organization
– Builds their own infrastructure
* Information Technology can put up roadblocks
– Shadow IT is unencumbered
– Use the cloud
– Might also be able to innovate
* Limited resources
– Company budget
* Medium sophistication
– May not have IT training or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly