Threat Actors Flashcards

(56 cards)

1
Q

Threat Actor Motivations

A

■ Data Exfiltration
■ Blackmail
■ Espionage
■ Service Disruption
■ Financial Gain,
■ Philosophical/Political Beliefs
■ Ethical Reasons
■ Revenge
■ Disruption/Chaos
■ War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor Attributes

A

■ Internal vs. External Threat Actors
■ Differences in resources and funding
■ Level of sophistication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Types of Threat Actors

A

Unskilled Attackers
Hacktivists
Organized Crime
Nation-state Actor
Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Limited technical expertise, use readily available tools

A

Unskilled Attackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Driven by political, social, or environmental ideologies

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Execute cyberattacks for financial gain (e.g., ransomware, identity theft)

A

Organized Crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Highly skilled attackers sponsored by governments for cyber espionage or
warfare

A

Nation-state Actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Security threats originating from within the organization

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IT systems, devices, software, or services managed without explicit organizational
approval

A

Shadow IT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

■ Message-based
■ Image-based
■ File-based
■ Voice Calls
■ Removable Devices
■ Unsecured Networks

A

Threat Vectors and Attack Surfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deception and Disruption Technologies

A

Honeypots
Honeynets
Honeyfiles
Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Decoy systems to attract and deceive attackers

A

Honeypots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network of decoy systems for observing complex attacks

A

Honeynets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Decoy files to detect unauthorized access or data breaches

A

Honeyfiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Fake data to alert administrators when accessed or used

A

Honeytokens

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Specific objective or goal that a threat actor is aiming to achieve through
their attack

A

Threat Actors Intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Underlying reasons or driving forces that pushes a threat actor to carry
out their attack

A

Threat Actors Motivation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Unauthorized transfer of data from a computer

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Achieved through various means, such as ransomware attacks, or through
banking trojans that allow them to steal financial information in order to
gain unauthorized access into the victims’ bank accounts

A

Financial Gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attacker obtains sensitive or compromising information about an
individual or an organization and threatens to release this information to
the public unless certain demands are met

A

Blackmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Some threat actors aim to disrupt the services of various organizations,
either to cause chaos, make a political statement, or to demand a ransom

A

Service Disruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

● Attacks that are conducted due to the philosophical or political beliefs of
the attackers is known as hacktivism
● Common motivation for a specific type of threat actor known as a
hacktivist

A

Philosophical or Political Beliefs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Contrary to malicious threat actors, ethical hackers, also known as
Authorized hackers, are motivated by a desire to improve security

A

Ethical Reasons

24
Q

It can also be a motivation for a threat actor that wants to target an entity
that they believe has wronged them in some way

25
Creating and spreading malware to launching sophisticated cyberattacks against the critical infrastructure in a populated city
Disruption or Chaos
26
Spying on individuals, organizations, or nations to gather sensitive or classified information
Espionage
27
Cyber warfare can be used to disrupt a country's infrastructure, compromise its national security, and to cause economic damage
War
28
2 Most Basic Attributes of a Threat Actor
Internal Threat Actors External Threat Actors
29
Individuals or entities within an organization who pose a threat to its security
Internal Threat Actors
30
Individuals or groups outside an organization who attempt to breach its cybersecurity defenses
External Threat Actors
31
Tools, skills, and personnel at the disposal of a given threat actor
Resources and funding available to the specific threat actor
32
Refers to their technical skill, the complexity of the tools and techniques they use, and their ability to evade detection and countermeasures
Level of sophistication and capability of the specific threat actor
33
○ Individual with limited technical knowledge ○ use pre-made software or scripts to exploit computer systems and networks
Unskilled Attacker (Script Kiddie)
34
Individuals or groups that use their technical skills to promote a cause or drive social change instead of for personal gain
Hacktivists
35
Organized cybercrime groups are groups or syndicates that have banded together to conduct criminal activities in the digital world ■ Sophisticated and well structured ■ Use resources and technical skills for illicit gain
Organized Crime
36
Groups or individuals that are sponsored by a government to conduct cyber operations against other nations, organizations, or individuals
Nation-state Actor
37
Attack that is orchestrated in such a way that it appears to originate from a different source or group than the actual perpetrators, with the intent to mislead investigators and attribute the attack to someone else
False Flag Attack
38
A prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period while trying to steal data or monitor network activities rather than cause immediate damage
Advanced Persistent Threat (APT)
39
■ Cybersecurity threats that originate from within the organization ■ Will have varying levels of capabilities
Insider Threats
40
■ Use of information technology systems, devices, software, applications, and services without explicit organizational approval ■ IT-related projects that are managed outside of, and without the knowledge of, the IT department
Shadow IT
40
Involves the use of personal devices for work purposes
Bring Your Own Devices (BYOD)
41
Means or pathway by which an attacker can gain unauthorized access to a computer or network to deliver a malicious payload or carry out an unwanted action
Threat Vector
42
Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment
Attack Surface
43
Attack Surface can be minimized by:
Restricting Access Removing unnecessary software Disabling unused protocols
44
Specific methods and patterns of activities or behaviors associated with a particular threat actor or group of threat actors
Tactics, Techniques, and Procedures (TTP
44
Use of voice calls to trick victims into revealing their sensitive information to an attacker
Vishing
45
Attacker might leave a malware-infected USB drive in a location where their target might find it, such as in the parking lot or the lobby of the targeted organization
Baiting
45
Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices, spread malware, or even establish an on-path attack to intercept communications without any user interaction
BlueBorne
46
Type of Denial of Service attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device
BlueSmack
47
Bogus DNS entries Creating decoy directories Dynamic page generation Use of port triggering to hide services Spoofing fake telemetry data
Some disruption technologies and strategies to help secure our enterprise networks
47
Technologies designed to mislead, confuse, and divert attackers from critical assets while simultaneously detecting and neutralizing threats
Deceptive and Disruption Technologies
48
Fake Domain Name System entries introduced into your system's DNS server
Bogus DNS entries
49
Fake folders and files placed within a system's storage
Creating decoy directories
50
Effective against automated scraping tools or bots trying to index or steal content from your organization's website
Dynamic page generation
50
Port Triggering ○ Security mechanism where specific services or ports on a network device remain closed until a specific outbound traffic pattern is detected
Use of port triggering to hide services
51
When a system detects a network scan is being attempted by an attacker, it can be configured to respond by sending out fake telemetry or network data
Spoofing fake telemetry data