Skip to the content.

Threats

Threat Actors

A Threat Actor is defined as an individual or a group posing a threat (according to NIST SP 800-150 under Threat Actor).

To learn more, please see Threat Actors.

Attacker

An Attacker is always an individual, but a Threat Actor can be either a group or an entity. The three most common goals of cybersecurity attackers are DAD:

To learn more about common attacks, please see Attacks.

Hackers

There are five types of hackers:

Types of Hackers

White Hats

Non-malicious hackers who attempt to break into a company’s systems at their request.

Black Hats

Malicious hackers who break into computer systems and networks without authorization or permission.

Gray Hats

Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so.

Difference with Black Hat: Gray hats doesn’t have any malicious intent.

Blue Hats

Hackers who attempt to hack into a network with permission of the company but are not employed by the company.

Elite

Hackers who find and exploit vulnerabilities before anyone else does. 1 in 10,000 are elite.

Script kiddies

Script kiddies have limited skill and only run other people’s exploits and tools.

Types of Threats

There are many types of cyber threats to organizations. Below are several of the most common types:

Malware

Malicious software designed to harm or exploit systems.

Virus

A virus requires user interaction, such as opening an infected file or running a malicious program, to spread.

Types of viruses:

Worm

A worm can replicate and spread automatically without user intervention.

Trojan

Trojans can also create backdoors but are only active while a specific application is running.

RAT (Remote Access Trojan)

Mitigation:

Ransomware

Malware that encrypts files, demanding payment for their release.

Mitigation:

Zombies and Botnets

A botnet is a network of compromised computers, known as zombies or bots , which are remotely controlled by malicious actors.

Command and Control Node (C2 Node)

Rootkits

A rootkit tries to maintain root-level access while concealing malicious activity.

DLL Injection

Shim

Mitigation:

Backdoors and Logic Bombs

Backdoors

Easter Eggs

Logic Bombs

Key Logger

A piece of a software or hardware that records every single keystroke made on the device.

Mitigation:

Spyware and Bloatware

Spyware

Bloatware


Back to main page