Threat Actors Flashcards
Threat Actor Motivations
What is the difference between threat actors’ intent and motivation?
Intent is the specific objective or goal that a threat actor aims to achieve, while motivation refers to the underlying reasons or driving forces behind the attack.
Threat Actor Motivations
What does the term ‘Data Exfiltration’ refer to?
Unauthorized transfer of data from a computer.
Threat Actor Motivations
How can threat actors achieve Financial Gain?
Through various means such as ransomware attacks or banking trojans that steal financial information.
Threat Actor Motivations
What is Blackmail in the context of cyber threats?
Threat Actor Motivations
Obtaining sensitive information and threatening to release it unless demands are met.
Threat Actor Motivations
What is the goal of Service Disruption by threat actors?
To disrupt the services of organizations, cause chaos, make political statements, or demand ransom.
Threat Actor Motivations
What is hacktivism?
Attacks conducted due to the philosophical or political beliefs of the attackers.
Threat Actor Motivations
What motivates ethical hackers?
A desire to improve security.
Threat Actor Motivations
What can be a motivation for a threat actor seeking Revenge?
Targeting an entity believed to have wronged them.
Threat Actor Motivations
What does the term ‘Disruption or Chaos’ imply in cyber threats?
Creating and spreading malware or launching cyberattacks against critical infrastructure.
Threat Actor Motivations
What is Espionage in the context of cyber threats?
Spying on individuals, organizations, or nations to gather sensitive or classified information.
Threat Actor Motivations
What is the impact of Cyber Warfare?
Disruption of a country’s infrastructure, compromise of national security, and economic damage.
Threat Actor Attributes
What are Internal Threat Actors?
Individuals or entities within an organization who pose a threat to its security
Internal threat actors can include employees, contractors, or anyone with access to organizational resources.
Threat Actor Attributes
What are External Threat Actors?
Individuals or groups outside an organization who attempt to breach its cybersecurity defenses
External threat actors often include hackers, cybercriminals, and competitors.
Threat Actor Attributes
What factors influence the capabilities of a threat actor?
Resources and funding available to the specific threat actor
* Tools, skills, and personnel at the disposal of a given threat actor
* Level of sophistication and capability of the specific threat actor
Resources can dictate the extent of attacks, while sophistication refers to their ability to bypass security measures.
Threat Actor Attributes
What does the level of sophistication refer to in cybersecurity?
Refers to their technical skill, the complexity of the tools and techniques they use, and their ability to evade detection and countermeasures
Sophisticated actors often employ advanced methods to achieve their objectives.
Threat Actor Attributes
What are script kiddies?
Individuals with limited technical knowledge who use pre-made software or scripts to exploit computer systems and networks
Script kiddies typically do not create their own tools.
Threat Actor Attributes
Who are considered high-level threat actors?
Nation-state actors, Advanced Persistent Threats (APTs), and others with high levels of sophistication and capabilities
These actors possess advanced technical skills and often target critical infrastructure.
Threat Actor Attributes
Fill in the blank: The lowest skilled threat actors are classified as _______.
script kiddies
What are hacktivists?
Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain
Hacktivists operate based on ideological beliefs.
Define hacktivism.
Activities in which the use of hacking and other cyber techniques is used to promote or advance a political or social cause
Hacktivism combines hacking with activism.
What motivates hacktivists?
Primarily motivated by their ideological beliefs rather than trying to achieve financial gains
This distinguishes them from traditional hackers.
What are organized cybercrime groups?
Groups or syndicates that conduct criminal activities in the digital world
They are sophisticated and well-structured, using resources and technical skills for illicit gain.
What is a key characteristic of the technical capabilities of organized crime groups?
They possess a very high level of technical capability and employ advanced hacking techniques and tools
Examples include custom malware, ransomware, and sophisticated phishing campaigns.
List some illicit activities organized cybercrime groups engage in to generate revenue.
- Data Breaches
- Identity Theft
- Online Fraud
- Ransomware Attacks
These activities are aimed at financial gain for their members.