Threat Actors Flashcards
An individual or entity responsible for incidents that impact security and data protection.
Threat Actor
Specific characteristics or properties that define and differentiate various threat actors from one another are known as:
Threat Actor Attributes
Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks are known as:
Unskilled Attackers
Cyber Attackers who carry out their activities driven by political, social change, or environmental ideologies who often want to draw attention to a specific cause instead of personal gain are known as:
Hacktivists
Well structured groups that execute cyberattacks for financial gain, usually through methods like ransomware, identity theft or credit card fraud are known as:
Organized Crime
Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries.
Nation State Attackers
Security threats that originate from within the organization
insider Threats
What is IT systems, devices, software, applications, and services called that are managed and utilized without explicit organizational approval?
Shadow IT ( Stealth IT or Client IT )
Decoy systems or servers designed to attract and deceive potential attackers, simulating real-world IT assets to study their techniques. They can be used against insider threats to detect internal fraud, snooping, and malpractice. Place it within a screened subnet or isolated segment that is easily accessed by potential attackers are called:
Honeypots
normally used by big organizations where these are a network of Honeypots used to create an entire network of systems like servers, routers, and switches of decoy systems to observe complex, multi-stage attacks logs all activities to provide a wealth of data about both successful and unsuccessful attacks:
Honeynets
Decoy files placed within systems to detect unauthorized access, lures attackers, or data breaches are known as
Honeyfiles
Fake pieces of data, like a fabricated user credential, great for insider threats and inserted into databases or systems to alert administrators when they are accessed or used are called:
Honeytokens
examples of Threat Actor Motivations include:
Data Exfiltration - unauthorized transfer of data from a PC
Blackmail
Espionage - committed by nation state actors
Service Disruption - Distributed Denial of Service (DDOS)
Financial Gain - ransomware attacks / Banking Trojans
Philosophical or Political Beliefs
Ethical Reasons
Revenge
Disruption or chaos
War
These refer to the tools, skills, and personnel at the disposal of a given threat actor
Resources and Funding
Internal vs. External
Resources and Funding
Level of sophistication and capability are examples of:
Threat Actor Attributes
Unskilled attackers who depend on other peoples scripts or hacking tools, who are motivated by a desire for recognition or the thrill are also known as:
Script Kiddies
Software tools like DDOS, low orbit ion cannon
Unskilled attackers
Hacktivists use the following:
Website Defacement -
DDOS Attacks - where the attack is to stop your organizations legitimate users to be able to access
Doxing - involves public release about an individual or org
Leaking of Sensitive Data -