Threat Actors Flashcards

Objectives 1.2, 2.1, and 2.2

1
Q

Informational

Threat Actor Motivations

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Data Exfiltration
  • Blackmail
  • Espionage
  • Service Disruption
  • Financial Gain
  • Philosophical / Politcal Beliefs
  • Ethical Reasons
  • Revenge
  • Disruption / Chaos
  • War

Threat Actors

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Informational

Threat Actor Attributes

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Internal vs. External Threat Actors
  • Differences in resources and funding
  • Level of sphistication

Threat Actors

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define / Explain

Unskilled Attackers

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Limited technical expertise, use readily available tools

Threat Actors

Types of Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define / Explain

Hacktivists

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Driven by political, social, or environmental ideologies

Threat Actors

Types of Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define / Explain

Organized Crime

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Execute cyberattacks for financial gain (e.g., ransomeware, identity theft)

Threat Actors

Types of Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define / Explain

Nation-state Actor

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Highly skilled attackers sponsored by governments for cyber espionage or warfare

Threat Actors

Types of Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define / Explain

Insider Threats

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Security threats originating from within the organization

Threat Actors

Types of Threat Actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define / Explain

Shadow IT

Threat Actors

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

IT systems, devices, software, or services managed without explicit organizational approval

Threat Actors

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Informational

Threat Vectors and Attack Surfaces

Threat Actors

Obj. 2.2 - Explain common threat vectors and attack surfaces | Threat Actors

A
  • Message-based
  • Image-based
  • File-based
  • Voice Calls
  • Removable Devices
  • Unsecured Networks

Threat Actors

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define / Explain

Honeypots

Threat Actors

Deception and Disruption Technologies | Threat Actors

A

Decoy systems to attract and deceive attackers

Threat Actors

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define / Explain

Honeynets

Threat Actors

Deception and Disruption Technologies | Threat Actors

A

Network of decoy systems for observing complex attacks

Threat Actors

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define / Explain

Honeyfiles

Threat Actors

Deception and Disruption Technologies | Threat Actors

A

Decoy files to detect unauthorized access or data breaches

Threat Actors

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define / Explain

Honeytokens

Threat Actors

Deception and Disruption Technologies | Threat Actors

A

Fake data to alert administrators when accessed or used

Threat Actors

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define / Explain

Threat Actors Intent

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Specific objective or goal that a threat actor is aiming to achieve through their attack

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define / Explain

Threat Actors Motiviation

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Underlying reasons or driving forces that pushes a threat actor to carry out their attack

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define / Explain

Data Exfiltration

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Unauthorized transfer of data from a computer

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define / Explain

Financial Gain

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Achieved through various means, such as ransomware attacks, or through banking trojans that allow them to steal financial information in order to gain unauthorized access into the victims’ bank accounts

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define / Explain

Blackmail

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Attacker obtains sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Informational

Service Disruption

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Some threat actors aim to disrupt the services of various organizations, either to cause chaos, make a political statement, or to demand a ransom

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Informational

Philosophical / Political Beliefs

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Attacks that are conducted due to the philosophical or political beliefs of the attackers is known as hacktivism
  • Common motivation for a specific type of threat actor known as a hacktivist

Threat Actor Motivations

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Informational

Ethical Reasons

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Contrary to malicious threat actors, ethical hackers, also known as authorized hackers, are motivated by a desire to improve security

Threat Actor Motivations

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Informational

Revenge

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

It can also be a motivation for a threat actor that wants to target an entity that they believe has wronged them in some way

Threat Actor Motivations

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Informational

Disruption / Chaos

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Created and spreading malware to launching sophisticated cyberattacks against the critical infrastructure in a populated city

Threat Actor Motivations

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define / Explain

Espionage

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Spying on individuals, organizations, or nations to gather sensitive or classified information

Threat Actor Motivations

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Informational

War

Threat Actor Motivations

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Cyber warfare can be used to disrupt a country’s infrastructure, compromise its national security, and to cause economic damage

Threat Actor Motivations

Informational

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Define / Explain

Internal Threat Actors

Threat Actor Attributes

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Individuals or entities within an organization who pose a threat to its security

Threat Actor Attributes

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define / Explain

External Threat Actors

Threat Actor Attributes

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Individuals or groups outside an organization who attempt to breach its cybersecurity defenses

Threat Actor Attributes

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define / Explain

Script Kiddie
(Unskilled Attacker)

Threat Actor Attributes

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Individual with limited technical knowledge
  • Use pre-made software or scripts to exploit computer systems and networks

Threat Actor Attributes

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define / Explain

Hacktivists

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain

Hacktivists

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Define / Explain

Hacktivism

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Activities in which the use of hacking and other cyber techniques is used to promote or advance a political or social cause

Hacktivists

Define / Explain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Define / Explain

Website Defacement

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Form of electronic graffiti and is usually treated as an act of vandalism

Hacktivists

Define / Explain

32
Q

Define / Explain

Distributed Denial of Service Attacks
(DDoS)

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users

Hacktivists

Define / Explain

33
Q

Define / Explain

Doxing

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Involves the public release of private information about an individual or organization

Hacktivists

Define / Explain

34
Q

Define / Explain

Leaking of Sensitive Data

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Releasing sensitive data to the public at large over the internet

Hacktivists

Define / Explain

35
Q

Informational

Anonymous
(group)

Hacktivists

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Loosely affiliated collective that has been involved in numerous high-profile attacks over the years for targeting organizations that they perceive as acting unethically or against the public interest at large

Hacktivists

Informational

36
Q

Informational

Organized Cyber Crime Groups

Organized Crime

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Sophisticated and well-structured entities that leverage resources and technical skills for illicit gain

Organized Crime

Informational

37
Q

Define / Explain

Nation-State Actor

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Groups or individuals that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals

Nation-State Actor

Define / Explain

38
Q

Define / Explain

False Flag Attack

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else

Nation-State Actor

Define / Explain

39
Q

Define / Explain

Stuxnet Worm

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Sophisticated piece of malware that was designed to sabotage the Iranian government’s nuclear program

Nation-State Actor

Define / Explain

40
Q

Define / Explain

Advanced Persistent Threat
(APT)

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Term that used to be used synonymously with a nation-state actor because of their long-term persistence and stealth

Nation-State Actor

Define / Explain

41
Q

Informational

Advanced Persistent Threat
(APT)

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause damage
  • These advanced persistent threats are often sponsored by a nation-state or its proxies, like organized cybercrime groups

Nation-State Actor

Informational

42
Q

Informational

What motivates a nation-state actor?

Nation-State Actor

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Nation-state actors are motivated to achieve their long-term strategic goals, and they are not seeking financial gain

Nation-State Actor

Informational

43
Q

Define / Explain

Insider Threats

Insider Threats

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Cybersecurity threats that originate from within the organization, and will have varying levels of capabilities

Insider Threats

Define / Explain

44
Q

Informational

Insider threats can take various forms…

Insider Threats

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Data theft
  • Sabotage
  • Misuse of access privileges

Insider Threats

Informational

45
Q

Informational

Each insider threat is driven by different motivations…

Insider Threats

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Some are driven by financial gain and they want to profit from the sale of sensitive organizational data to others
  • Some may be motivated by revenge and are aiming to harm the organization due to some kind of perceived wrong levied against the insider
  • Some may take actions as a result of carelessness or a lack of awareness of cybersecurity best practices

Insider Threats

Informational

46
Q

Informational

Insider Threat…
(Remember)

Insider Threats

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

refers to the potential risk posed by individuals within an organization who have access to sensitive information and systems, and who may misuse this access for malicious or unintended purposes

Insider Threats

Informational

47
Q

Informational

To mitigate the risk of an insider threat being successful, organizations should implement the following
(Remember)

Insider Threats

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A
  • Zero-trust architecture
  • Employ robust access controls
  • Conduct regular audits
  • Provide effective employee security awareness programs

Insider Threats

Informational

48
Q

Define / Explain

Shadow IT

Shadow IT

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Use of information technology systems, devices, software, applications, and services without explicit organizational approval

Shadow IT

Define / Explain

49
Q

Informational

Shadow IT

Shadow IT

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

IT-related projects that are managed outside of, and without the knowledge of, the IT department

Shadow IT

Informational

50
Q

Informational

Why does Shadow IT exist?

Shadow IT

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

An organization’s security posture is set too complex/high for business operations to occur without being negatively affected

Shadow IT

Informational

51
Q

Informational

Bring Your Own Devices (BYOD)

Shadow IT

Obj. 2.1 - Compare and contrast common threat actors and motivations | Threat Actors

A

Involves the use of personal devices for work purposes

Shadow IT

Informational

52
Q

Define / Explain

Threat Vector

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action

Threat Vectors and Attack Surfaces

Define / Explain

53
Q

Define / Explain

Attack Surface

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment

Threat Vectors and Attack Surfaces

Define / Explain

54
Q

Informational

Attack Surface can be minimized by…

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Restricting access
  • Removing unnecessary software
  • Disabling unused protocols

Threat Vectors and Attack Surfaces

Informational

55
Q

Define / Explain

Think of threat vector as…

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

the “how” of an attack

Threat Vectors and Attack Surfaces

Define / Explain

56
Q

Define / Explain

Think of attack surface as…

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

the “where” of an attack

Threat Vectors and Attack Surfaces

Define / Explain

57
Q

Define / Explain

Messages
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A
  • Message-based threat vectors include threats delivered via email, simple message service (SMS text messaging), or other forms of instant messaging
  • Phishing campaigns are commonly used as part of a message-based threat vector when an attacker impersonates a trusted entity to trick its victims into revealing their sensitive information to the attacker

Threat Vectors and Attack Surfaces

Define / Explain

58
Q

Informational

Images
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Image-based threat vectors involve the embedding of malicious code inside of an image file by the threat actor

Threat Vectors and Attack Surfaces

Informational

59
Q

Informational

Files
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

The files, often disguised as legitimate documents or software, can be transferred as email attachments, through file-sharing services, or hosted on a malicous website

Threat Vectors and Attack Surfaces

Informational

60
Q

Informational

Voice Calls / Vhishing
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Use of voice calls to trick victims into revealing their sensitive information to an attacker

Threat Vectors and Attack Surfaces

Informational

61
Q

Informational

Removable Devices / Baiting
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Attacker might leave a malware-infected USB drive in a location where their target might find it, such as in the parking lot or the lobby of the targeted organization

Threat Vectors and Attack Surfaces

Informational

62
Q

Informational

Unsecure Networks / Wireless
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

If wireless networks are not properly secured, unauthorized individuals can intercept the wireless communications or gain access to the network

Threat Vectors and Attack Surfaces

Informational

63
Q

Informational

Unsecure Networks / Wired
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

Physical access to the network infrastructure can lead to various attacks such as:
* MAC Address Cloning
* VLAN Hopping

Threat Vectors and Attack Surfaces

Informational

64
Q

Informational

Unsecure Networks / Bluetooth
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

BlueBorne
Set of vulnerabilities in bluetooth technology that can allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction

Threat Vectors and Attack Surfaces

Informational

65
Q

Define / Explain

Unsecure Networks / Bluetooth
(Threat Vector Methods)

Threat Vectors and Attack Surfaces

Obj. 2.2 - Explain common threat vectors and attack surfaces

A

BlueSmack
Type of denial of service attack that targets bluetooth-enabled devices by sending a specially crafted logical link control and adaptation protocol packet to a target device

Threat Vectors and Attack Surfaces

Informational

66
Q

Define / Explain

Tactics, Techniques, and Procedures (TTPs)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors

Outsmarting Threat Actors

Define / Explain

67
Q

Define / Explain

Deceptive / Disruption Technologies

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats

Outsmarting Threat Actors

Define / Explain

68
Q

Define / Explain

Honeypots

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts`

A

Decoy system or network set up to attract potential hackers

Outsmarting Threat Actors

Define / Explain

69
Q

Define / Explain

Honeynets

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Network of honeypots to create a more complex system that is designed to mimic an entire network of systems
* Servers
* Routers
* Switches

Outsmarting Threat Actors

Define / Explain

70
Q

Define / Explain

Honeyfiles

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Decoy file placed within a system to lure in potential attackers

Outsmarting Threat Actors

Define / Explain

71
Q

Define / Explain

Honeytokens

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Piece of data or a resource that has no legitimate value or use but is monitored for access or use

Outsmarting Threat Actors

Define / Explain

72
Q

Define / Explain

Bogus DNS entries
(Disruption technology/strategy)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Fake Domain Name System entries introduced into your system’s DNS server

Outsmarting Threat Actors

Define / Explain

73
Q

Define / Explain

Creating decoy directories
(Disruption technology/strategy)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Fake folders and files placed wtihin a system’s storage

Outsmarting Threat Actors

Define / Explain

74
Q

Define / Explain

Dynamic page generation
(Disruption technology/strategy)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Effective against automated scraping tools or bots trying to index or steal content from your organization’s website

Outsmarting Threat Actors

Define / Explain

75
Q

Define / Explain

Port Triggering
(Disruption technology/strategy)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected (use of port triggering to hide services)

Outsmarting Threat Actors

Define / Explain

76
Q

Define / Explain

Spoofing fake telemetry data
(Disruption technology/strategy)

Outsmarting Threat Actors

Obj. 1.2 - Summarize fundamental security concepts

A

When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data

Outsmarting Threat Actors

Define / Explain