Section 3: Threat Actors Flashcards

OBJ (1.2, 2.1, & 2.2)

1
Q

Threat Actor

A

An individual or entity responsible for incidents that impact security and data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor Attributes

A

Specific characteristics or properties that define and differentiate various threat actors from one another.

Unskilled Attackers, Hacktivists, Organized Crime, Nation-state Actors, Insider Threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unskilled Attackers

A

Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hacktivists

A

Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Organized Crime

A

Well-structured groups that execute cyberattacks for financial gain, usually through methods like ransomware, identity theft, or credit card fraud.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Nation-state Actors

A

Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety industries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Insider Threats

Data Theft, Sabotage, Misuse of Access Privileges.

A

Security threats that originate from within the organization.

1) Driven by financial gain (profit from the sale of sensitive organization data) 2) Motivated by revenge and harm the organization. 3) Result of carelessness or a lack of awareness of cybersecurity best practices by one of the organization’s users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shadow IT

The use of information technology.

Use of Personal Devices for Work Purposes, Installation of Unapproved Software, Use of Cloud Services that Have not Been Approved by the Organization.

A

IT systems, devices, software, applications, and services that are managed and utilized without explicit organizational approval.

USB Drive, External Hard Drive, Keyboard, Wired Mouse, Network Adapter.

Message-based, Image-based, File-based, Voice Calls, Removable Devices, Use of Unsecured Networks. HoneyPots, HoneyNets, HoneyFiles, HoneyTokens.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Honeypots

Gathering information about the attacker’s methods, motives, and TTPs.

Honeypots can be used against insider threats to detect internal fraud, snooping, and malpractice.

A

Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques.

To install a honeypot in a enterprise network, place it within a screened subnet or isolated segment that is easily accessed by potential attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Honeynets

Controlled Environment. Logs all activites.

The attacker could use to learn how production systems are configured.

A

Creates an entire network of decoy systems to observe complex, multi-stage attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Honeyfiles

Enumerating the attacker’s network.

Word-processing documents, Spreadsheets, Presentation files, Images, Database files, Executables. Embedded with unique identifiers or watermarks to help track the file if it is stolen or copied and are usually placed under loose or less strict defenses that files that contain actual sensitive data they have.

A

Decoy files placed within systems to detect unauthorized access or data breaches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Honeytokens

Fake user account, a bogus URL, or a dummy database record.

Useful for detecting insider threats. Using bogus DNS entries, Creating decoy directories, Generating dynamic page, Using port triggering, Spoofing fake telemetry data.

A

Fake pieces of data, like a fabricated user credential inserted into databases or systems to alert administrators when they are accessed or used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bogus DNS

A

Fake DNS entries introducted into a system’s DNS server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decoy Directories

A

Fake folders and files placed within a system’s storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dynamic Page Generation

A

Used in websites to present ever-changing content to web crawlers to confuse and slow down the threat actor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port Triggering

A

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Threat Actor Motivations

Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical or Political Beliefs, Ethical Reasons, Revenge, Disruption or Chaos, War.

A

Intent behind an attack and the motivation that fuels that attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Data Exfiltration

A

The unauthorized transfer of data from a computer.

Selling it on the dark web, Using it for identity theft, Leveraging it for a competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Financial Gain

A

One of the most common motivations for cybercriminals

Ransomware Attacks, Banking Trojans.

21
Q

Blackmail

A

The attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met.

22
Q

Service Disruption

A

Often achieved by conducting a Distributed Denial of Service (DDoS) attack to overwhelm a network, service, or server with excessive amounts of traffic so that it becomes unavailable to its normal users.

23
Q

Philosophical or Political Beliefs

A

Individuals or groups use hacking to promote a political agenda, social change, or to protest against organizations they perceive as unethical.

24
Q

Ethical Reasons

A

Ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security.

25
Q

Revenge

A

An employee who is disgruntled, or one who has recently been fired or laid off, might want to harm their current or former employer by causing a data breach, disrupting services, or leaking sensitive information.

26
Q

Disruption or Chaos

A

These actors, often referred to as Unauthorized hackers, engage in malicious activities for the thrill of it, to challenge their skills or simply to cause harm.

27
Q

Espionage

A

Involves spying on individuals, organizations, or nations to gather sensitive or classified information.

28
Q

War

A

Cyberattacks have increasingly become a tool for nations to attack each other both on and off the battlefield.

29
Q

Threat Actor Attributes

Internal vs. External, Resources and Funding, Level of sophistication and capability.

A

Internal vs. External, Resources and Funding, Level of sophistication and capability.

30
Q

Internal Threat Actors

A

Individuals or entites within an organization who pose a threat to its security.

31
Q

External Threat Actors

A

Individuals or groups outside an organization who attempt to breach its cybersecurity defenses.

32
Q

Resources and Funding

A

Refers to the tools, skills and personnel at the disposal of a given threat actor.

33
Q

Level of sophistication and capability

A

Refers to their technical skill, the complexity of the tools and techniques they use, and their ability to evade detection and countermeasures.

34
Q

Unskilled Attacker

Script Kiddie

A

An individual who lacks the technical knowledge to develop their own hacking tools or exploits.

35
Q

Website Defacement

electronic graffiti

A

Electronic graffiti, usually treated as an act of vandalism.

36
Q

Distributed Denial of Service Attack (DDoS)

A

Attempting to overwhelm the victim’s systems or networks so they cannot be accessed by the organization’s legitmate users.

37
Q

Doxxing

A

Public release of private information about an individual or organization such as their name, home addres, phone number, or email in hopes that someone will take the real-world actions against the victim.

Stealing and releasing sensitive data.

38
Q

Organized Cyber Crime Groups

Data Breaches, Identity Theft, Online Fraud, Ransomware Attacks.

A

Sophiscated and well-structured entities that leverage resources and technical skills for illicit gain.

Cryptocurriences, Dark Web, Cellular Collection Devices.

FIN7: Sophisicated cybercrime syndicate that has been linked to numerous high-profile data breaches. Carbanak: Sophisticated cybercrime syndicae that has stolen over $1 billion from various banks around the world.

39
Q

Nation-State Actors

A

Groups that are sponsored by a government to conduct cyber operations aganist other nations, organizations, or individuals.

40
Q

False Flag Attack

A

Attack that is orchestrated in such a way that it appears to originate from a different source or group.

Creating Custom Malware, Using Zero-day Exploits, Becoming an Advanced Persistent Threat.

41
Q

Advanced Persistent Threat (APT)

Prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period of time while trying to steal data or monitor network activites.

A

Term that used to be used synonymously with a nation-state actor because of their long-term persistance and stealth.

Gathering Intelligence, Disrupting Critical Infrastructure, Influencing Political Processes.

42
Q

Stuxnet Worm

A

Sophisticated piece of malware that was designed to sabotage the Iranian government’s nuclear program.

43
Q

Threat Vector

A

The means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

44
Q

Attack Surface

This represents the sum of all potential vulnerabilites and entry points that an attacker could exploit. Messages, Images, Files, Voice Calls, Removable Devices, Unsecure Networks.

A

Ecompasses all the various points where an unauthorized user can try to enter data to extract data from an environment.

Restricting Access, Removing Unnecessary Software, Disabling Unused Protocols.

45
Q

BlueBorne

A

Set of vulnerabilties in Bluetooth technology that can allow an attacker to take over devices or spread malware.

46
Q

BlueSmack

A

Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protcol packet to a target device.

47
Q

Tactics, Techniques, and Procedures (TTPs)

A

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors.

48
Q

Deceptive and Disruption Technologies

A

Designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats.