Skip to the content.

Threat Actors

Threat Actors

Threat actors are individuals or groups that carry out malicious activities to compromise security, disrupt operations, or gain unauthorized access to data and resources.

Motivations

The motivations behind the threat actors’ actions can vary significantly. Note that there is a difference between the intent behind the attack and the motivation that fuels the attack.

Some common motivations are:

Threat Actor Attributes

Specific characteristics or properties that define and differentiate various threat actors from one another.

Internal vs. External

Resources and Funding

Levels of Sophistication and Capability

Types of Threat Actors

Unskilled Attackers

Commonly called “Script Kiddies”, this threat actors have little to no skill who only use the tools and exploits written by others.

Hacktivists

Attackers who are driven by a cause like social change, political agendas, or terrorism, often to promote or protest against specific issues or actions.

Organized Crime

Attackers who are part of a crime group that is well-funded and highly sophisticated.

Advanced Persistent Threats

Highly trained and funded groups of hackers (often by nation states) with covert and open-source intelligence at their disposal.

Nation-state actors sometimes conduct False Flag Attack, which is orchestrated to make it appear that the attack originated from a different source or group with the intent to mislead investigators.

Motivations of Nation-state actors:

Insider Threats

Often overlooked, insider threats are security threats that originate from within the organization.

Outsmarting Threat Actors

These methods can work individually or in combination to help security teams monitor, detect, and analyze threat actor activities.

Honeypots

Honeynets

Honeyfiles

Honey Tokens

Other Disruption Technologies

In addition to the methods mentioned above, there are other disruption technologies we can use to help secure our systems. They provide a layer of deception and misdirection that can delay, confuse, or deter attackers, thereby enhancing overall security.

Using Bogus DNS Entries

Creating Decoy Directories

Generating Dynamic Pages to Slow Down Web Crawlers

Using Port Triggering to Hide Services

Spoofing Fake Telemetry Data During a Detected Network Scan


Back to main page