Threat Actors Flashcards
Threat actor motivations:
Data Exfiltration
Blackmail
Espionage
Service Disruption
Financial Gain,
Philosophical/Political Beliefs
Ethical Reasons
Revenge
Disruption/Chaos
War
Threat Actor Attributes
Internal vs. External Threat Actors
Differences in resources and funding
Level of sophistication
Types of Threat Actors
1: Unskilled Attackers
Limited technical expertise, use readily available tools
2: Hacktivists
Driven by political, social, or environmental ideologies
3: Organized Crime
Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
4: Nation-state Actor
Highly skilled attackers sponsored by governments for cyber espionage or warfare
5: Insider Threats
Security threats originating from within the organization
Shadow IT
IT systems, devices, software, or services managed without explicit organizational approval
Threat Vectors and Attack Surfaces
Image-based
File-based
Voice Calls
Removable Devices
Unsecured Networks
Deception and Disruption Technologies
1: Honeypots
Decoy systems to attract and deceive attackers
2: Honeynets
Network of decoy systems for observing complex attacks
3: Honeyfiles
Decoy files to detect unauthorized access or data breaches
4: Honeytokens
o Fake data to alert administrators when accessed or used
Threat Actors Intent
Specific objective or goal that a threat actor is aiming to achieve through their attack
Threat Actor Motivation
Underlying reasons or driving forces that pushes a threat actor to carry out their attack
Different motivations behind threat actors
1: Data Exfiltration
Unauthorized transfer of data from a computer
2: Financial Gain
Achieved through various means, such as ransomware attacks, or through banking trojans that allow them to steal financial information in order to gain unauthorized access into the victims’ bank accounts
3: Blackmail
Attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met
4: Service Disruption
Some threat actors aim to disrupt the services of various organizations, either to cause chaos, make a political statement, or to demand a ransom
5: Philosophical or Political Beliefs
Attacks that are conducted due to the philosophical or political beliefs of the attackers is known as hacktivism
Common motivation for a specific type of threat actor known as a hacktivist
6: Ethical Reasons
Contrary to malicious threat actors, ethical hackers, also known as Authorized hackers, are motivated by a desire to improve security
7: Revenge
It can also be a motivation for a threat actor that wants to target an entity that they believe has wronged them in some way
8: Disruption or Chaos
Creating and spreading malware to launching sophisticated cyberattacks against the critical infrastructure in a populated city
9: Espionage
Spying on individuals, organizations, or nations to gather sensitive or classified information
10: War
Cyber warfare can be used to disrupt a country’s infrastructure, compromise its national security, and to cause economic damage
2 Most Basic Attributes of a Threat Actor
1: Internal Threat Actors
Individuals or entities within an organization who pose a threat to its security
2: External Threat Actors
Individuals or groups outside an organization who attempt to breach its cybersecurity defenses
In the world of cybersecurity, we usually classify the lowest skilled threat actors as “script kiddies”. What is ‘script kiddie’:
Individual with limited technical knowledge
use pre-made software or scripts to exploit computer systems and networks
How do these unskilled attackers cause damage?
One way is to launch a DDoS attack
An unskilled attacker can simply enter in the IP address of the system they want to target, and then click a button to launch an attacker against that target
Hacktivist
Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain
To accomplish their objectives, hacktivists use a wide range of techniques to achieve their goals
1: Website Defacement
Form of electronic graffiti and is usually treated as an act of vandalism
2: Distributed Denial of Service (DDoS) Attacks
Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users
3: Doxing
Involves the public release of private information about an individual or organization
3: Leaking of Sensitive Data
o Releasing sensitive data to the public at large over the internet
o Hacktivists are primarily motivated by their ideological beliefs rather than trying to achieve financial gains
Criminal groups will engage in a variety of illicit activities to generate revenue for their members
Data Breaches
Identity Theft
Online Fraud
Ransomware Attacks