Skip to main content

Threat Actors

What Is a Threat Actor?

Any individual, group, or entity that poses a risk to the confidentiality, integrity, or availability of information systems.


Threat Actor Categories

TypeMotivationSophisticationResources
Nation-StateEspionage, sabotage, political disruptionVery HighVery High
Organized CrimeFinancial gainHighHigh
HacktivistsIdeology, political agendaMediumLow–Medium
Insider ThreatsRevenge, financial gain, accidentalVariesInternal access
Script KiddiesNotoriety, curiosityLowLow
CompetitorsEconomic advantageMediumMedium
TerroristsFear, disruption, ideologyVariesVaries

Nation-State Actors (APTs)

APT (Advanced Persistent Threat) — long-term, stealthy intrusion campaigns sponsored by governments.

Characteristics:
- Long dwell time (months to years undetected)
- Custom malware / zero-day exploits
- Multi-stage attack chains
- Targets: government, defense, critical infrastructure, finance

Notable APT groups:

  • APT28 (Fancy Bear) — Russia, political/military espionage
  • APT41 — China, dual espionage + cybercrime
  • Lazarus Group — North Korea, financial theft + espionage
  • APT34 (OilRig) — Iran, Middle East targets

Organized Crime

Goals: Financial theft, ransomware, fraud, data exfiltration for sale
TTPs:
- Ransomware-as-a-Service (RaaS)
- Banking trojans
- Credential theft + resale on dark web
- Business Email Compromise (BEC)

Hacktivists

Individuals or collectives using hacking to promote a political or social agenda.

Common tactics:
- DDoS attacks (disrupt websites/services)
- Website defacement
- Data leaks ("doxing")
Examples: Anonymous, LulzSec

Insider Threats

Threats from people with authorized access to systems.

TypeDescription
Malicious insiderIntentional harm — sabotage, theft, espionage
Negligent insiderAccidental misuse — clicking phishing links, misconfiguration
Compromised insiderCredentials stolen; attacker acts as them
Indicators of insider threat:
- Accessing data outside normal role
- Downloading large volumes of data
- Off-hours logins
- Disgruntled behavior + privileged access

Shadow IT

Unauthorized systems, services, or software used by employees without IT approval.

Risk:
- Unpatched, unmonitored assets
- Data stored in unapproved cloud services
- Bypasses security controls

Examples:
- Personal Dropbox for work files
- Unauthorized SaaS tools
- Personally installed apps on work devices

Threat Actor Attributes

AttributeDescription
SophisticationSkill level — script kiddie vs. nation-state
ResourcesBudget, personnel, tooling
MotivationFinancial, political, ideological, personal
IntentTargeted vs. opportunistic
Attack Surface TargetingWhat they’re going after (data, systems, people)

Threat Intelligence

Sources:
- OSINT (public threat feeds, CVE databases)
- ISAC (Information Sharing and Analysis Centers)
- Commercial threat intel (CrowdStrike, Recorded Future)
- Dark web monitoring
- MITRE ATT&CK framework (TTPs per threat group)