Threat Actors Flashcards
Dangerous users who run scripts created by others and make up the vast majority of attackers 86-91%
Script kiddies
Groups of hackers that work together and make up 8-12% of all attacks
Hacktivists
Criminal cyberscurity entities
Organized crime
Elite hackers that make up 1 - 2% of attacks
Nation States
Toolkits developed for the intent of gaining access and maintaining a presence on a target system/network. They go after current or new info are are sponsored by nation states
Advanced Persistent Threats (APTs)
Most dangerous as they have access to the network and knowledge of systems within.
Insiders
The Digital Age has made competitor theft much easier than ever before. Companies have a dependency
on information systems and competitors are able to copy, steal, or disrupt operations in many different ways.
Competitors
Internal threat actors have a distinct advantage over external actors in that they already
have access to the network. Although they may be limited by user access provisioning, external attackers have
the extra added step of establishing a connection into the network. Internal actors can immediately start
working on step two of the attack, which is privilege escalation
Internal/External
The majority of attacks seen today exploit old vulnerabilities or simple methods, while more advanced APTs
and zero-day vulnerabilities make up just a smaller percentage of these attacks.
Level of sophistication