Threat Actors Flashcards

1
Q

List some threat actor motivations

A

Data Exfiltration, Blackmail, Espionage, Service Disruption, Financial Gain, Philosophical/Political Beliefs, Ethical Reasons, Revenge, Disruption/Chaos, War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List the different types of threat actors
Explain their attributes

A

Unskilled Attackers: Limited technical expertise, use readily available tools

Hacktivists: Driven by political, social, or environmental ideologies

Organized Crime: Execute cyberattacks for financial gain (e.g., ransomware, identity theft)

Nation-state Actor: Highly skilled attackers sponsored by governments for cyber espionage or warfare

Insider Threats: Security threats originating from within the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is shadow IT?

A

IT systems, devices, software, or services managed without explicit organizational approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some threat vectors and attack surfaces?

A

Message-based, Image-based, File-based, Voice Calls, Removable Devices, and Unsecured networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List some deception and disruption technologies and explain what they do

A

Honeypots: Decoy systems to attract and deceive attackers

Honeynets: Network of decoy systems for observing complex attacks

Honeyfiles: Decoy files to detect unauthorized access or data breaches

Honeytokens: Fake data to alert administrators when accessed or used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between a threat actor’s intent and motivation?

A

Intent is the specific objective or goal that a threat actor aims to achieve through their attack, while motivation refers to the underlying reasons or driving forces that push a threat actor to carry out their attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data Exfiltration?

A

The unauthorized transfer of data from a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can Financial Gain be achieved by threat actors?

A

Through various means such as ransomware attacks or banking trojans that steal financial information to gain unauthorized access to victims’ bank accounts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Blackmail in the context of cyber threats?

A

When an attacker obtains sensitive or compromising information and threatens to release it unless certain demands are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is espionage in the context of cyber threats?

A

Spying on individuals, organizations, or nations to gather sensitive or classified information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In the world of cybersecurity, we usually classify the lowest skilled threat actors as

A

script kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one way unskilled attackers cause damage?

A

launching DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hacktivism?

A

Hacktivism refers to attacks conducted to promote a political or social cause, often associated with a specific type of threat actor known as a hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are some of the techniques hacktivists use to achieve their goals?

A

Website Defacement: Form of electronic graffiti and is usually treated as an act of vandalism

Distributed Denial of Service (DDoS) Attacks: Attempting to overwhelm the victim’s systems or networks so that they cannot be accessed by the organization’s legitimate users

Doxing: Involves the public release of private information about an individual or organization

Leaking of Sensitive Data: Releasing sensitive data to the public at large over the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Most well-known hacktivist groups is?

A

Anonymous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else is?

This technique is sometimes used by?

A

A False Flag Attack

Nation State Actors

15
Q

What are some ways to improve security within an organization and mitigate against insider threats?

A

Zero trust architecture, employing robust access controls, conducting regular audits, and providing effective employee security awareness programs.

16
Q

What is an attack surface?

A

An attack surface encompasses all the various points where an unauthorized user can try to enter or extract data from an environment. It can be minimized by restricting access, removing unnecessary software, and disabling unused protocols

16
Q

What is a threat vector?

A

A threat vector is a means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action.

16
Q

A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage is known as

A

Advanced Persistent Threat (APT)

(Used by Nation State Actors)

17
Q

What is BlueBorne?

A

BlueBorne is a set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or establish an on-path attack to intercept communications without user interaction

18
Q

What is BlueSmack?

A

BlueSmack is a type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device.

19
Q

What are Tactics, Techniques, and Procedures (TTPs)?

A

TTPs refer to specific methods and patterns of activities or behaviors associated with a
particular threat actor or group of threat actors.

20
Q

What are deception and disruption technologies?

A

These are technologies designed to mislead, confuse, and divert attackers from critical
assets while simultaneously detecting and neutralizing threats.

21
Q

What are some disruption technologies and strategies to secure enterprise networks?

A

Bogus DNS entries: Fake Domain Name System entries introduced into the system’s
DNS server.

Creating decoy directories: Fake folders and files placed within a system’s storage.

Dynamic page generation: Effective against automated scraping tools or bots
attempting to index or steal content from the organization’s website.

Use of port triggering to hide services: A security mechanism where specific services
or ports remain closed until a specific outbound traffic pattern is detected

Spoofing fake telemetry data: Configuring a system to send out fake telemetry or
network data in response to detected network scans by an attacker