Understanding who is a threat actor and how to identify them.

Myra Jarenga
OSINT for all
Published in
4 min readOct 3, 2023

Introduction

A threat actor(Malicous attacker) in the cybersecurity space refers to an individual, group, or organization that carries out actions with the intent to compromise the security of computer systems, networks, or data. These actors can have various motivations, which can include financial gain, espionage, activism, or even just a desire to cause disruption.

The following are the most common types of malicious attackers we see today.

  1. Organized Crime

Several years ago, the cybercrime industry took over the number-one spot, previously held by the drug trade, for the most profitable illegal industry. As you can imagine, it has attracted a new type of cybercriminal. Just as it did back in the days of Prohibition, organized crime goes where the money is. Organized crime consists of very well-funded and motivated groups that will typically use any and all of the latest attack techniques. Whether that is ransomware or data theft, if it can be monetized, organized crime will use it.

2. Hactivist

This type of threat actor is not motivated by money. Hacktivists are looking to make a point or to further their beliefs, using cybercrime as their method ofattack. These types of attacks are often carried out by stealing sensitive data and then revealing it to the public for the purpose of embarrassing or financially affecting a target.

3. State-sponsered Attackers

Cyber war and cyber espionage are two terms that fit into this category. Many governments around the world today use cyber attacks to steal information from their opponents and cause disruption. Many believe that the next Pearl Harbor will occur in cyberspace. That’s one of the reasons the United States declared cyberspace to be one of the operational domains that U.S. forces would be trained to defend.

4. Insider Threat

An insider threat is a threat that comes from inside an organization. The motivations of these types of actors are normally different from those of many of the other common threat actors. Insider threats are often normal employees who are tricked into divulging sensitive information or mistakenly clicking on links that allow attackers to gain access to their computers. However, they could also be malicious insiders who are possibly motivated by revenge or money.

Now that we’ve explored some of the most common types of malicious threat actors in the cybersecurity space, it’s crucial to understand how to identify them. Recognizing these actors and their motivations can greatly enhance your ability to defend against potential cyber threats.

Here are some key indicators to look for:

  1. Organized Crime:
  • Sophisticated Techniques: Organized crime groups often employ advanced attack techniques. Look for signs of well-coordinated, multifaceted attacks.
  • Monetization Focus: Their primary goal is financial gain. Watch for signs of ransomware attacks, data theft, or other tactics aimed at extracting money.

2. Hacktivists:

  • Political or Ideological Messages: Hacktivists aim to make a statement or further their beliefs. Keep an eye out for public disclosures of sensitive data intended to embarrass or financially impact a target.
  • Lack of Financial Gain: Unlike other threat actors, hacktivists are not primarily motivated by money. Their actions are driven by ideological or political agendas.

2. State-Sponsored Attackers:

  • High-Level Espionage Tactics: State-sponsored actors often employ advanced tactics reminiscent of cyber warfare. Look for signs of sophisticated and coordinated attacks.
  • Targets of National Interest: Their focus is on stealing information to further their country’s interests. Pay attention to sectors of strategic importance, such as defense, energy, or technology.

2.Insider Threats:

  • Unusual Behavior Patterns: Monitor for unusual activities or deviations from an employee’s normal behavior. This could include accessing sensitive data without authorization or downloading large amounts of data.
  • Social Engineering Indicators: Watch for signs of employees being manipulated or tricked into divulging sensitive information. This could involve phishing emails or other deceptive tactics.

3. Technical Artifacts:

  • Malware Signatures: Analyze for known malware signatures or patterns associated with specific threat actors. This can help identify the source of an attack.
  • Command and Control Infrastructure: Investigate the infrastructure used by attackers to communicate with compromised systems. This can provide valuable clues about their origin.

4. Geographical and Language Clues:

  • IP Addresses: Track the geographic location of IP addresses involved in attacks. This can provide insights into the potential origin of the threat actor.
  • Language Proficiency: Analyze the language used in communication or code. This can offer clues about the threat actor’s native language or region.

Remember, identifying threat actors requires a combination of technical expertise, situational awareness, and a deep understanding of cyber threat landscapes. Regular training, threat intelligence sharing, and staying up-to-date with industry news are essential components of a robust cybersecurity strategy. By honing your ability to identify malicious threat actors to your organization or as an individual, you’ll be better equipped to protect your systems and data from potential breaches. Stay vigilant, and always prioritize security.

If you would like to connect with me you can do so on LinkedIn Myra Jarenga, you can also send me a DM on Twitter @myrajarenga for us to chat more on this topic. You can support me by following me on this blog. Thank you.

--

--

Myra Jarenga
OSINT for all

A Cybersecurity analyst with customer service experience and AI expert.