Threat Actors Flashcards

1
Q

Threat Actor Motivations

A

■ Data Exfiltration
■ Blackmail
■ Espionage
■ Service Disruption
■ Financial Gain,
■ Philosophical/Political Beliefs
■ Ethical Reasons
■ Revenge
■ Disruption/Chaos
■ War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor Attributes

A

■ Internal vs. External Threat Actors
■ Differences in resources and funding
■ Level of sophistication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Threat Actors

A

Unskilled Attackers
Hacktivists
Organized Crime
Nation-state Actor
Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Limited technical expertise, use readily available tools

A

Unskilled Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Driven by political, social, or environmental ideologies

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Execute cyberattacks for financial gain (e.g., ransomware, identity theft)

A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Highly skilled attackers sponsored by governments for cyber espionage or
warfare

A

Nation-state Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security threats originating from within the organization

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IT systems, devices, software, or services managed without explicit organizational
approval

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

■ Message-based
■ Image-based
■ File-based
■ Voice Calls
■ Removable Devices
■ Unsecured Networks

A

Threat Vectors and Attack Surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deception and Disruption Technologies

A

Honeypots
Honeynets
Honeyfiles
Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Decoy systems to attract and deceive attackers

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network of decoy systems for observing complex attacks

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decoy files to detect unauthorized access or data breaches

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fake data to alert administrators when accessed or used

A

Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Specific objective or goal that a threat actor is aiming to achieve through
their attack

A

Threat Actors Intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Underlying reasons or driving forces that pushes a threat actor to carry
out their attack

A

Threat Actors Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unauthorized transfer of data from a computer

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Achieved through various means, such as ransomware attacks, or through
banking trojans that allow them to steal financial information in order to
gain unauthorized access into the victims’ bank accounts

A

Financial Gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attacker obtains sensitive or compromising information about an
individual or an organization and threatens to release this information to
the public unless certain demands are met

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Some threat actors aim to disrupt the services of various organizations,
either to cause chaos, make a political statement, or to demand a ransom

A

Service Disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

● Attacks that are conducted due to the philosophical or political beliefs of
the attackers is known as hacktivism
● Common motivation for a specific type of threat actor known as a
hacktivist

A

Philosophical or Political Beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Contrary to malicious threat actors, ethical hackers, also known as
Authorized hackers, are motivated by a desire to improve security

A

Ethical Reasons

24
Q

It can also be a motivation for a threat actor that wants to target an entity
that they believe has wronged them in some way

A

Revenge

25
Q

Creating and spreading malware to launching sophisticated cyberattacks
against the critical infrastructure in a populated city

A

Disruption or Chaos

26
Q

Spying on individuals, organizations, or nations to gather sensitive or
classified information

A

Espionage

27
Q

Cyber warfare can be used to disrupt a country’s infrastructure,
compromise its national security, and to cause economic damage

A

War

28
Q

2 Most Basic Attributes of a Threat Actor

A

Internal Threat Actors
External Threat Actors

29
Q

Individuals or entities within an organization who pose a threat to its
security

A

Internal Threat Actors

30
Q

Individuals or groups outside an organization who attempt to breach its
cybersecurity defenses

A

External Threat Actors

31
Q

Tools, skills, and personnel at the disposal of a given threat actor

A

Resources and funding available to the specific threat actor

32
Q

Refers to their technical skill, the complexity of the tools and techniques they
use, and their ability to evade detection and countermeasures

A

Level of sophistication and capability of the specific threat actor

33
Q

○ Individual with limited technical knowledge
○ use pre-made software or scripts to exploit computer systems and
networks

A

Unskilled Attacker (Script Kiddie)

34
Q

Individuals or groups that use their technical skills to promote a cause or drive
social change instead of for personal gain

A

Hacktivists

35
Q

Organized cybercrime groups are groups or syndicates that have banded together to
conduct criminal activities in the digital world
■ Sophisticated and well structured
■ Use resources and technical skills for illicit gain

A

Organized Crime

36
Q

Groups or individuals that are sponsored by a government to conduct cyber
operations against other nations, organizations, or individuals

A

Nation-state Actor

37
Q

Attack that is orchestrated in such a way that it appears to originate from
a different source or group than the actual perpetrators, with the intent
to mislead investigators and attribute the attack to someone else

A

False Flag Attack

38
Q

A prolonged and targeted cyberattack in which an intruder gains unauthorized
access to a network and remains undetected for an extended period while trying
to steal data or monitor network activities rather than cause immediate damage

A

Advanced Persistent Threat (APT)

39
Q

■ Cybersecurity threats that originate from within the organization
■ Will have varying levels of capabilities

A

Insider Threats

40
Q

■ Use of information technology systems, devices, software, applications, and
services without explicit organizational approval
■ IT-related projects that are managed outside of, and without the knowledge of,
the IT department

A

Shadow IT

40
Q

Involves the use of personal devices for work purposes

A

Bring Your Own Devices (BYOD)

41
Q

Means or pathway by which an attacker can gain unauthorized access to a
computer or network to deliver a malicious payload or carry out an unwanted
action

A

Threat Vector

42
Q

Encompasses all the various points where an unauthorized user can try to enter
data to or extract data from an environment

A

Attack Surface

43
Q

Attack Surface can be minimized by:

A

Restricting Access
Removing unnecessary software
Disabling unused protocols

44
Q

Specific methods and patterns of activities or behaviors associated with a
particular threat actor or group of threat actors

A

Tactics, Techniques, and Procedures (TTP

44
Q

Use of voice calls to trick victims into revealing their sensitive
information to an attacker

A

Vishing

45
Q

Attacker might leave a malware-infected USB drive in a
location where their target might find it, such as in the
parking lot or the lobby of the targeted organization

A

Baiting

45
Q

Set of vulnerabilities in Bluetooth technology that can
allow an attacker to take over devices, spread malware, or
even establish an on-path attack to intercept
communications without any user interaction

A

BlueBorne

46
Q

Type of Denial of Service attack that targets
Bluetooth-enabled devices by sending a specially crafted
Logical Link Control and Adaptation Protocol packet to a
target device

A

BlueSmack

47
Q

Bogus DNS entries
Creating decoy directories
Dynamic page generation
Use of port triggering to hide services
Spoofing fake telemetry data

A

Some disruption technologies and strategies to help secure our enterprise networks

47
Q

Technologies designed to mislead, confuse, and divert attackers from critical
assets while simultaneously detecting and neutralizing threats

A

Deceptive and Disruption Technologies

48
Q

Fake Domain Name System entries introduced into your system’s DNS
server

A

Bogus DNS entries

49
Q

Fake folders and files placed within a system’s storage

A

Creating decoy directories

50
Q

Effective against automated scraping tools or bots trying to index or steal
content from your organization’s website

A

Dynamic page generation

50
Q

Port Triggering
○ Security mechanism where specific services or ports on a network
device remain closed until a specific outbound traffic pattern is
detected

A

Use of port triggering to hide services

51
Q

When a system detects a network scan is being attempted by an attacker,
it can be configured to respond by sending out fake telemetry or network
data

A

Spoofing fake telemetry data