Section 3: Threat Actors Flashcards
OBJ (1.2, 2.1, & 2.2)
Threat Actor
An individual or entity responsible for incidents that impact security and data protection.
Threat Actor Attributes
Specific characteristics or properties that define and differentiate various threat actors from one another.
Unskilled Attackers, Hacktivists, Organized Crime, Nation-state Actors, Insider Threats.
Unskilled Attackers
Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks.
Hacktivists
Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause.
Organized Crime
Well-structured groups that execute cyberattacks for financial gain, usually through methods like ransomware, identity theft, or credit card fraud.
Nation-state Actors
Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety industries.
Insider Threats
Data Theft, Sabotage, Misuse of Access Privileges.
Security threats that originate from within the organization.
1) Driven by financial gain (profit from the sale of sensitive organization data) 2) Motivated by revenge and harm the organization. 3) Result of carelessness or a lack of awareness of cybersecurity best practices by one of the organization’s users.
Shadow IT
The use of information technology.
Use of Personal Devices for Work Purposes, Installation of Unapproved Software, Use of Cloud Services that Have not Been Approved by the Organization.
IT systems, devices, software, applications, and services that are managed and utilized without explicit organizational approval.
USB Drive, External Hard Drive, Keyboard, Wired Mouse, Network Adapter.
Message-based, Image-based, File-based, Voice Calls, Removable Devices, Use of Unsecured Networks. HoneyPots, HoneyNets, HoneyFiles, HoneyTokens.
Honeypots
Gathering information about the attacker’s methods, motives, and TTPs.
Honeypots can be used against insider threats to detect internal fraud, snooping, and malpractice.
Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques.
To install a honeypot in a enterprise network, place it within a screened subnet or isolated segment that is easily accessed by potential attackers.
Honeynets
Controlled Environment. Logs all activites.
The attacker could use to learn how production systems are configured.
Creates an entire network of decoy systems to observe complex, multi-stage attacks.
Honeyfiles
Enumerating the attacker’s network.
Word-processing documents, Spreadsheets, Presentation files, Images, Database files, Executables. Embedded with unique identifiers or watermarks to help track the file if it is stolen or copied and are usually placed under loose or less strict defenses that files that contain actual sensitive data they have.
Decoy files placed within systems to detect unauthorized access or data breaches.
Honeytokens
Fake user account, a bogus URL, or a dummy database record.
Useful for detecting insider threats. Using bogus DNS entries, Creating decoy directories, Generating dynamic page, Using port triggering, Spoofing fake telemetry data.
Fake pieces of data, like a fabricated user credential inserted into databases or systems to alert administrators when they are accessed or used.
Bogus DNS
Fake DNS entries introducted into a system’s DNS server.
Decoy Directories
Fake folders and files placed within a system’s storage.
Dynamic Page Generation
Used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor.
Port Triggering
Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected.
Threat Actor Motivations
Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical or Political Beliefs, Ethical Reasons, Revenge, Disruption or Chaos, War.
Intent behind an attack and the motivation that fuels that attack.
Data Exfiltration
The unauthorized transfer of data from a computer.
Selling it on the dark web, Using it for identity theft, Leveraging it for a competitive advantage.