Threat Actors Flashcards
List some threat actor motivations
Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical/Political Beliefs, Ethical Reasons, Revenge, Disruption/Chaos, War
List the different types of threat actors
Explain their attributes
Unskilled Attackers: Limited technical expertise, use readily available tools
Hacktivists: Driven by political, social, or environmental ideologies
Organized Crime: Execute cyberattacks for financial gain (e.g., ransomware, identity theft)
Nation-state Actor: Highly skilled attackers sponsored by governments for cyber espionage or warfare
Insider Threats: Security threats originating from within the organization
What is shadow IT?
IT systems, devices, software, or services managed without explicit organizational approval
What are some threat vectors and attack surfaces?
Message-based, Image-based, File-based, Voice Calls, Removable Devices, and Unsecured networks
List some deception and disruption technologies and explain what they do
Honeypots: Decoy systems to attract and deceive attackers
Honeynets: Network of decoy systems for observing complex attacks
Honeyfiles: Decoy files to detect unauthorized access or data breaches
Honeytokens: Fake data to alert administrators when accessed or used
What is the difference between a threat actor’s intent and motivation?
Intent is the specific objective or goal that a threat actor aims to achieve through their attack, while motivation refers to the underlying reasons or driving forces that push a threat actor to carry out their attack.
What is Data Exfiltration?
The unauthorized transfer of data from a computer
How can Financial Gain be achieved by threat actors?
Through various means such as ransomware attacks or banking trojans that steal financial information to gain unauthorized access to victims’ bank accounts.
What is Blackmail in the context of cyber threats?
When an attacker obtains sensitive or compromising information and threatens to release it unless certain demands are met.
What is espionage in the context of cyber threats?
Spying on individuals, organizations, or nations to gather sensitive or classified information
In the world of cybersecurity, we usually classify the lowest skilled threat actors as
script kiddies
What is one way unskilled attackers cause damage?
launching DDoS attacks
What is hacktivism?
Hacktivism refers to attacks conducted to promote a political or social cause, often associated with a specific type of threat actor known as a hacktivist
What are some of the techniques hacktivists use to achieve their goals?
Website Defacement: Form of electronic graffiti and is usually treated as an act of vandalism
Distributed Denial of Service (DDoS) Attacks: Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users
Doxing: Involves the public release of private information about an individual or organization
Leaking of Sensitive Data: Releasing sensitive data to the public at large over the internet
Most well-known hacktivist groups is?
Anonymous