Objetive 2.1 Flashcards
Compare and contrast common threat actors and motivations. (73 cards)
An individual or entity responsible for incidents that impact security and data protection.
Threat Actor
Specific characteristics or properties that define and differentiate various threat actors from one another.
Threat Actor Attributes
Types of Threat Actors
- Unskilled Attackers
- Hacktivists
- Organized Crime
- Nation-state Actors
- Insider Threats
[Threat Actors] Individuals with limited technical expertise who use readily available tools like downloaded scripts or exploits to carry out attacks.
Unskilled Attackers
[Threat Actors] Well-structured groups that execute cyberattacks for financial gain, usually through methods like ransomware, identity theft, or credit card fraud.
Organized Crime
[Threat Actors] Cyber attackers who carry out their activities driven by political, social, or environmental ideologies who often want to draw attention to a specific cause.
Hacktivists
[Threat Actors] Highly skilled attackers that are sponsored by governments to carry out cyber espionage, sabotage, or cyber warfare against other nation states or specific targets in a variety of industries.
Nation-state Actors
[Threat Actors] Security threats that originate from within the organization.
Insider Threats
IT systems, devices, software, applications, and services that are managed and utilized without explicit organizational approval.
Shadow IT
Refers to the specific objective or goal that a threat actor is aiming to achieve.
Threat Actor Intent
Underlying reasons or driving forces that pushes a threat actor ot carry out the attack.
Threat Actor Motivation
These below are types of threat actor… ?
- Data Exfiltration
- Philosophical or Political Beliefs
- Blackmail
- Ethical Reasons
- Espionage
- Revenge
- Service Disruption
- Disruption or Chaos
- Financial Gain
- War
Threat Actor Motivations
Unauthorized transfer of data from a computer.
Data Exfiltration
Examples of data exfiltration purposes
- Selling it on the dark web
- Using it for identity theft
- Levaraging it for a competitive advantage
One of the most common motivations for cyberriminals.
Financial Gain
E
Examples of Financial Gains motivation attacks
- Ransomware Attacks
- Banking Trojans
The attacker obtain sensitive or compromising information about an individual or an organization and threatens to release this information to the public unless certain demands are met.
Blackmail
Examples of cyber blackmail motivation attacks
- Ransomware
- Doxxing
- Sextortion
Often achieved by conducting a Distributed Denial of Service (DDoS) attack to overwhelm a network, service, or server with excessive amounts of traffic so that it becomes unavailable to its normal users.
Service Disruption
Individuals or groups use hacking to promote a political agenda, social change, or to protest against organizations they perceive as unethical.
Philosophical or Political Beliefs
Also known as Authorized hackers, are motivated by a desire to improve security.
Ethical Reasons
Examples of Ethical Reasons attack Actors
- Pentesters
- Bounty hunters
An employee who is disgrunted, or one who has recently been fired or laid off, might want to harm their current or former employer by causing a data breach, disrupting services, or leaking sensitive information.
Revenge
These actors, often referred to as Unauthorized hackers, engage in malicious activities for the thrill of it, to challenge their skills, or simply to cause harm.
Disruption or Chaos