MD3 Types of threat actors Flashcards

1
Q

Threat actors

A

A threat actor is any person or group who presents a security risk. This broad definition refers to people inside and outside an organization. It also includes individuals who intentionally pose a threat, and those that accidentally put assets at risk. That’s a wide range of people!

Threat actors are normally divided into five categories based on their motivations:

Competitors refers to rival companies who pose a threat because they might benefit from leaked information.

State actors are government intelligence agencies.

Criminal syndicates refer to organized groups of people who make money from criminal activity.

Insider threats can be any individual who has or had authorized access to an organization’s resources. This includes employees who accidentally compromise assets or individuals who purposefully put them at risk for their own benefit.

Shadow IT refers to individuals who use technologies that lack IT governance. A common example is when an employee uses their personal email to send work-related communications.

In the digital attack surface, these threat actors often gain unauthorized access by hacking into systems. By definition, a hacker is any person who uses computers to gain access to computer systems, networks, or data. Similar to the term threat actor, hacker is also an umbrella term. When used alone, the term fails to capture a threat actor’s intentions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Types of hackers

A

Because the formal definition of a hacker is broad, the term can be a bit ambiguous. In security, it applies to three types of individuals based on their intent:

Unauthorized hackers

Authorized, or ethical, hackers

Semi-authorized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unauthorized hackers

A

An unauthorized hacker, or unethical hacker, is an individual who uses their programming skills to commit crimes. Unauthorized hackers are also known as malicious hackers. Skill level ranges widely among this category of hacker. For example, there are hackers with limited skills who can’t write their own malicious software, sometimes called script kiddies. Unauthorized hackers like this carry out attacks using pre-written code that they obtain from other, more skilled hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Authorized, or ethical, hackers

A

Authorized, or ethical, hackers refer to individuals who use their programming skills to improve an organization’s overall security. These include internal members of a security team who are concerned with testing and evaluating systems to secure the attack surface. They also include external security vendors and freelance hackers that some companies incentivize to find and report vulnerabilities, a practice called bug bounty programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Semi-authorized hackers

A

Semi-authorized hackers typically refer to individuals who might violate ethical standards, but are not considered malicious. For example, a hacktivist is a person who might use their skills to achieve a political goal. One might exploit security vulnerabilities of a public utility company to spread awareness of their existence. The intentions of these types of threat actors is often to expose security risks that should be addressed before a malicious hacker finds them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Advanced persistent threats

A

Many malicious hackers find their way into a system, cause trouble, and then leave. But on some occasions, threat actors stick around. These kinds of events are known as advanced persistent threats, or APTs.

An advanced persistent threat (APT) refers to instances when a threat actor maintains unauthorized access to a system for an extended period of time. The term is mostly associated with nation states and state-sponsored actors. Typically, an APT is concerned with surveilling a target to gather information. They then use the intel to manipulate government, defense, financial, and telecom services.

Just because the term is associated with state actors does not mean that private businesses are safe from APTs. These kinds of threat actors are stealthy because hacking into another government agency or utility is costly and time consuming. APTs will often target private organizations first as a step towards gaining access to larger entities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Access Points

A

Each threat actor has a unique motivation for targeting an organization’s assets. Keeping them out takes more than knowing their intentions and capabilities. It’s also important to recognize the types of attack vectors they’ll use.

For the most part, threat actors gain access through one of these attack vector categories:

Direct access, referring to instances when they have physical access to a system

Removable media, which includes portable hardware, like USB flash drives

Social media platforms that are used for communication and content sharing

Email, including both personal and business accounts

Wireless networks on premises

Cloud services usually provided by third-party organizations

Supply chains like third-party vendors that can present a backdoor into systems

Any of these attack vectors can provide access to a system. Recognizing a threat actor’s intentions can help you determine which access points they might target and what ultimate goals they could have. For example, remote workers are more likely to present a threat via email than a direct access threat.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key Takeaways

A

Key takeaways

Defending an attack surface starts with thinking like a threat actor. As a security professional, it’s important to understand why someone would pose a threat to organizational assets. This includes recognizing that every threat actor isn’t intentionally out to cause harm.

It’s equally important to recognize the ways in which a threat actor might gain access to a system. Matching intentions with attack vectors is an invaluable skill as you continue to develop an attacker mindset.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly