Skip to main content

Section 1.4 Threat Actors

Figure 1.4.1. Guy Fawkes Mask Members Used by the Anonymous Hacker Group
To better be able to manage the risks of a data breach, it helps to be able to identify/understand the attacker or threat actor involved. Just as there are many reasons an actor may attempt to gain unauthorized access there are also many groups of threat actors.
Neophytes making use of automated tools that they may not fully understand are often referred to a script kiddies. You may hear other pejorative names as well such as lamer, noob, or luser, but the common thread is that these threat actors are not highly sophisticated. The same techniques used for automating defensive security can also be applied to automating attacks. Unfortunately this means that you may encounter actors "punching above their weight" or using complex tools while having only a rudimentary understanding of what they do.
Hacktivists are threat actors that attack to further social or political ends. These groups can be very sophisticated. The most well known hacktivist group is Anonymous which has been linked to several politically motivated attacks.
Organized crime is another element which may employ or support threat actors typically to make money. These groups typically have access to more resources and contacts than a solo actor. It is important to note that threat actors with roots in organized crime may find it easier to migrate into other areas of crime due to their proximity to a large criminal enterprise. For example, while it may be difficult for a script kiddie to broker the sale of valuable data, a hacker working with an organized crime syndicate may have people close to them that are familiar with the sale of stolen goods.
The last group of threat actors, and arguably the group with the most resources, are threat actors working with or for governments and nation states. These groups may have the explicit or implicit permission of their country to commit cyber crimes targeting other nations. Given the constant threat and resources available to these groups, they are referred to as an advanced persistent threat (APT). By utilizing the resources of a nation (often including its intelligence and military resources) APTs are a severe threat.
You have attempted 1 of 1 activities on this page.