Threats, Vulnerabilities, and Mitigations Flashcards
Threat Actors
- entity responsbile for an event that hs an impact on the safety of another entity
- also called a malicious actor
Attributes of Threat Actors
Internal / External
- Internal threat is Inside the target network
- disgruntled employee, third-party vendor, contractor.
- External is outside the network
Attributes of Threat Actors
Resources / Funding
- The financial Backing behind the threat actor
-very from minial - script kiddie, to high - APT and criminal syndicates.
Attributes of Threat Actors
Level of Sophistication / Capability
- skill level, tech knowledge, and tech available.
-blindly running scripts / automated vuln scans
-can write their own attack, malware, and scritps.
Motivations of Threat Actors
Data Exfiltration
- Seek to acquire sensitive or proprietary data from target, commonly for personal or monetary gain.
Motivations of Threat Actors
Espionage
- aquire secret or confidential data from target, commonly for enemy nation-states or business competitors.
Motivations of Threat Actors
Service Disruptions
- interrupt or stop availability to the target.
- disrupt connection to a business, website, entire network, such as an emergency response network.
Motivations of Threat Actors
Blackmail
- seek to aquire data/info that can be used to foce a target to complete a specified action, such as paying a monetary sum.
Motivations of Threat Actors
Financial Gain
- benefit monetaritly by exploiting an attack surface
- Organized crime is often motivated by financial gain.
Motivations of Threat Actors
Philosophical / Political Beliefs
- Act to forward an ideological belief or promote awareness of perceived issues.
- Hacktivists are aften motivates by philossophical/political beliefs.
Motivations of Threat Actors
Ethical
- Expose a vulnerability in a system with the aim of improving its security.
- White hat hackers are commonly ethically motivated.
Motivations of Threat Actors
Revenge
- Seek retribution for a perceived threat, embarrassment, or injustice.
- may target an individual or an entire org.
Motivations of Threat Actors
Disruption / Chaos
- Can be a goal in itself.
- cause problems for the target and disrupt normal operations.
Motivations of Threat Actors
War
- usually attempts to disrupt military operations or affect the outcome of a conflict.
Types of Threat Actors
Nation-State
- External Entity
- Government Funded, constant attacks, massive resources.
- APTs (Advanced Persistent Threats) who target government targets
- Many motivates: data exfiltrations, philosophical, revenge, disrution, WAR.
- Example: Stuxnet Worm - created by US/Israel to destroy 1k nuclear centrifuges.
Types of Threat Actors
Unskilled Attacker
- script kiddie - runs premade scripts without any knowledge of what’s happenig.
- Usually external but can be both.
- Limited resources, not very sophisticated.
- No formal funding, motivated by a desire to prove their skill set / or simple curiosity.
Types of Threat Actors
Havktivist
- Hacker with a purpose
-motivated by philosophy, revenge, disruption, etc ACTIVIST GOALS - Often external entity
- could potentially infiltrate to also be an insider threat.
- Can be remarkably sophisticated
-Very specific hacks, interrupting or drawing attentino to a perceived wrong. - DoS, website defacing, private document release.
- Funding may be limited
-some orgs may have fundraising
Types of Threat Actors
Insider Threat
- originates within the target network
-motivated by revenge, financial gain - Extensive Resources
-using org’s resources against themselves - Medium level sophistication
- has insitutional knowledge
- attacks can be directed at vulnerable systems, insider knows what to hit.
- Limited financial resources
Types of Threat Actors
Organized Crime
- Professional Criminals / Crimal Syndicate
- motivated by money
-almost always external - Very sophisticated
-best hacking money can buy - One person hacks, one manages the exploit, another sells the data, another handles customer support
- Lots of capital to fund hacking efforts
Types of Threat Actors
Shadow IT
- INTERNAL - Going rogue - authorized users using unauthorized technological solutions
-working around the internal IT org
-builds their own infrastructure - IT can put up roadblocks
-shadow IT is unencumbered
-use the cloud / might also be able to innovate - Limited resources
-because company budget - Medium sophistication
- May not have as much IT knowledge or training
Threat Vectors / Attack Vectors
- THE method used to exploit the attack surface (which is the vulnerability in the system that was exploited)
Types of Threat Vectors
Message-Based Vectors
- is the communication used to exploit the attack surface, such as phishing messages.
- Email
-malicious links in an email
-links to malicoius site - SMS (Short Message Service)
-attacks in a text - Social Engingeering attacks
Types of Threat Vectors
Image-Based Vectors
- malicious code can be embedded within image files.
-when image is accessed, code may be installed on target system. - SVG (Scalable Vector Graphic) Format - image and XML file - info WITH image - can inject HTML or javascript.
Types of Threat Vectors
File-Based Vectors
- includes files of all access methods: internal/external storage and communication, such as email or text-based messaging.
- malicious code can be embedded within these files: adobe PDF, ZIP/RAR, microsoft office- documents with macros or add in files.