Threat actors are individuals or groups who pose security risks to organizations.
Nation-state actors are government-sponsored entities involved in cyber espionage or attacks.
Example: A foreign government targeting critical infrastructure.
Unskilled attackers lack expertise and use simple attack methods.
Example: An individual attempting a basic phishing attack.
Hacktivists are individuals or groups using cyberattacks for political or social causes.
Example: A hacktivist group targeting a government website for protest.
Insider threats originate from within an organization, such as employees or contractors.
Example: A disgruntled employee leaking sensitive data.
Organized crime groups engage in cybercriminal activities for financial gain.
Example: A criminal syndicate involved in ransomware attacks.
Shadow IT refers to unauthorized or unmanaged technology within an organization.
Example: Employees using unapproved cloud services for work.
Attributes describe characteristics of threat actors.
Threat actors can be internal (within the organization) or external (outside the organization).
Example: An internal employee (internal) versus a hacker (external).
Threat actors may have access to resources or funding for cyberattacks.
Example: A well-funded criminal organization versus an individual hacker.
Threat actors vary in their level of sophistication and capability to execute attacks.
Example: A highly skilled nation-state actor versus a script kiddie.
Motivations drive threat actors to engage in cyberattacks.
Data exfiltration involves stealing sensitive information for various purposes.
Example: A hacker stealing customer data for sale on the dark web.
Espionage activities aim to gather intelligence and sensitive information.
Example: A nation-state actor spying on a foreign government's activities.
Service disruption attacks target the availability and functionality of systems or services.
Example: A DDoS attack causing a website outage.
Blackmail involves coercing victims by threatening to reveal sensitive information.
Example: Threatening to expose compromising photos unless a ransom is paid.
Threat actors engage in cybercrime to profit financially.
Example: Stealing credit card information for fraudulent transactions.
Some actors pursue cyber activities aligned with their philosophical or political ideologies.
Example: Hacking government websites to promote a political cause.
Ethical motivations drive actors to expose wrongdoing or security vulnerabilities.
Example: An ethical hacker discovering and reporting a security flaw.
Revenge-driven actors seek retaliation against individuals or organizations.
Example: An ex-employee launching an attack against their former employer.
Some actors aim to create chaos or disrupt critical systems.
Example: A cyberterrorist targeting power grids for chaos.
In some cases, threat actors engage in cyber warfare during conflicts.
Example: State-sponsored cyberattacks during international conflicts.