Threat Actors Flashcards

1.2 2.1 2.2

1
Q

Give me the different between Threat Actors Intent vs Motivation

A

Intent - Specific objective or goal that a threat actor is aiming to achieve through their attack
Motivation - Underlying reasons or driving forces that pushes a threat actor to carry out their attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List motivations behind threat actors

A

Data Exfiltration - Unauthorized transfers of data from a computer
Financial Gain - Achieved through various means, such as ransomware attack, or through banking trojans that allow them to steal financial information
Blackmail - Attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met
Service disruption - Some threat actors aim to disrupt the services
Philosophical or Political Beliefs - Hacktivist
Ethical Reasons - Motivated by a desire to improve security
Revenge
Disruption or Chaos - Creating and spreading malware to launching sophisticated cyberattacks.
Espionage - Spying organizations to gather sensitive or classified information
War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some ways that Hacktivists strategies

A

Website Defacement - form of eletronic graffiti and is usually treated as an act of vandalism
Distributed Denial of Service attacks
Doxing
Leaking of sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organized Crime

A

Sophisticated and well structures that uses tools like custom malware
Ransomware
Sophisticated phishing campaigns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Nation state actors

A

Creating custom malware
Using zero day exploits
Becoming an advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an advanced Persistent Threat (APT)

A

Term that used to be used synonymously with a nation state actor because of their long term persistence and stealth
A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor netwokr activities rather than cause immediate damage. These advanced persistent threats are often sponsored by a nation state or its proxies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IT shadow

A

the use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does TTPS mean

A

Tactics, techniques, and Procedures
Specific methods
Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Deceptive and Disruption Technologies

A

Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I’m describing a Deceptive and Disruption Technologies - Decoy system or network set up to attract potential hackers

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

I’m describing a Deceptive and Disruption Technologies - Network of honeypots to create a more complex system that is designed to mimic an entire network of systems - Servers - Routers - Switches

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

I’m describing a Deceptive and Disruption Technologies - Decoy files placed within a system to lure in potential attackers

A

Honey files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

I’m describing a Deceptive and Disruption Technologies - Piece of data or a resource that has no legitimate value or use but is monitored for access or use

A

Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Here are some disruption technologies and strategies to help secure our enterprise networks

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly