Threat Actors Flashcards
Threat actor motivations:
Data Exfiltration
Blackmail
Espionage
Service Disruption
Financial Gain,
Philosophical/Political Beliefs
Ethical Reasons
Revenge
Disruption/Chaos
War
Threat Actor Attributes
Internal vs. External Threat Actors
Differences in resources and funding
Level of sophistication
Types of Threat Actors
1: Unskilled Attackers
Limited technical expertise, use readily available tools
2: Hacktivists
Driven by political, social, or environmental ideologies
3: Organized Crime
Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
4: Nation-state Actor
Highly skilled attackers sponsored by governments for cyber espionage or warfare
5: Insider Threats
Security threats originating from within the organization
Shadow IT
IT systems, devices, software, or services managed without explicit organizational approval
Threat Vectors and Attack Surfaces
Image-based
File-based
Voice Calls
Removable Devices
Unsecured Networks
Deception and Disruption Technologies
1: Honeypots
Decoy systems to attract and deceive attackers
2: Honeynets
Network of decoy systems for observing complex attacks
3: Honeyfiles
Decoy files to detect unauthorized access or data breaches
4: Honeytokens
o Fake data to alert administrators when accessed or used
Threat Actors Intent
Specific objective or goal that a threat actor is aiming to achieve through their attack
Threat Actor Motivation
Underlying reasons or driving forces that pushes a threat actor to carry out their attack
Different motivations behind threat actors
1: Data Exfiltration
Unauthorized transfer of data from a computer
2: Financial Gain
Achieved through various means, such as ransomware attacks, or through banking trojans that allow them to steal financial information in order to gain unauthorized access into the victims’ bank accounts
3: Blackmail
Attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met
4: Service Disruption
Some threat actors aim to disrupt the services of various organizations, either to cause chaos, make a political statement, or to demand a ransom
5: Philosophical or Political Beliefs
Attacks that are conducted due to the philosophical or political beliefs of the attackers is known as hacktivism
Common motivation for a specific type of threat actor known as a hacktivist
6: Ethical Reasons
Contrary to malicious threat actors, ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security
7: Revenge
It can also be a motivation for a threat actor that wants to target an entity that they believe has wronged them in some way
8: Disruption or Chaos
Creating and spreading malware to launching sophisticated cyberattacks against the critical infrastructure in a populated city
9: Espionage
Spying on individuals, organizations, or nations to gather sensitive or classified information
10: War
Cyber warfare can be used to disrupt a country’s infrastructure, compromise its national security, and to cause economic damage
2 Most Basic Attributes of a Threat Actor
1: Internal Threat Actors
Individuals or entities within an organization who pose a threat to its security
2: External Threat Actors
Individuals or groups outside an organization who attempt to breach its cybersecurity defenses
In the world of cybersecurity, we usually classify the lowest skilled threat actors as “script kiddies”. What is ‘script kiddie’:
Individual with limited technical knowledge
use pre-made software or scripts to exploit computer systems and networks
How do these unskilled attackers cause damage?
One way is to launch a DDoS attack
An unskilled attacker can simply enter in the IP address of the system they want to target, and then click a button to launch an attacker against that target
Hacktivist
Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain
To accomplish their objectives, hacktivists use a wide range of techniques to achieve their goals
1: Website Defacement
Form of electronic graffiti and is usually treated as an act of vandalism
2: Distributed Denial of Service (DDoS) Attacks
Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users
3: Doxing
Involves the public release of private information about an individual or organization
3: Leaking of Sensitive Data
o Releasing sensitive data to the public at large over the internet
o Hacktivists are primarily motivated by their ideological beliefs rather than trying to achieve financial gains
Criminal groups will engage in a variety of illicit activities to generate revenue for their members
Data Breaches
Identity Theft
Online Fraud
Ransomware Attacks
Nation-state Actor
o Groups or individuals that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals
o Sometimes, these threat actors attempt what is known as a false flag attack
False Flag Attack
Attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else
Nation-state actors possess advanced technical skills and extensive resources, and they are capable of conducting complex, coordinated cyber operations that employ a variety of techniques such as:
Creating custom malware
Using zero-day exploits
Becoming an advanced persistent threats
What motivates a nation-state actor?
Term that used to be used synonymously with a nation-state actor because of their long-term persistence and stealth
A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage
These advanced persistent threats are often sponsored by a nation-state or its proxies, like organized cybercrime groups
Insider Threats
o Cybersecurity threats that originate from within the organization
Will have varying levels of capabilities
Insider threats can take various forms
Data Theft
Sabotage
Misuse of access privileges
To mitigate the risk of an insider threat being successful, organizations should implement the following
Zero-trust architecture
Employ robust access controls
Conduct regular audits
Provide effective employee security awareness programs
Shadow IT
Use of information technology systems, devices, software, applications, and services without explicit organizational approval
IT-related projects that are managed outside of, and without the knowledge of, the IT department
Why does Shadow IT exist?
An organization’s security posture is actually set too high or is too complex for business operations to occur without be negatively affected