ThreatConnect reveals the most common threat personas in cyber security

It is the duty of security operations directors to ensure that they have complete visibility into their security posture. With threat actorsโ€™ tactics evolving all the time, a comprehensive and flexible threat response is a must โ€“ neither governments nor enterprises can afford to leave the back door open. So what are the top threat personas that organisations need to be wary of?

ยท State sponsored hackers โ€“ These are the big dogs. The anonymity of web-based attacks means that nation-states can achieve their more ethically questionable aims via puppet actors, making it extremely difficult to prove links between individual hacks and state-sponsored campaigns.

However, state-sponsored hackers are sometimes identifiable by their attack patterns and dedication to a specific target. Theyโ€™re a tenacious breed – if you think youโ€™re being targeted by a state-backed hacker (and arenโ€™t a conspiracy theorist), you should be ready for a long struggle to throw them off.

ยท Ideological attackers โ€“ these threat actors, for example the hackers that targeted Dyn DNS systems, are intent on propagating their views with noisy, public attacks – website defacements and DDoS attacks, for example.

If after this sort of petulant demonstration they feel their message is not being heard, then they may look for a more spectacular platform upon which to propagate their doctrines. For some, that means espionage activity or strategic leaks of confidential documents in support of a broader information operations campaign; for others, it might simply mean a particularly mean series of insults on Twitterโ€ฆ

ยท Criminally motivated โ€“ Criminals have always been attracted to an easy buck, so itโ€™s hardly a surprise that theyโ€™d take advantage of the way technology has evolved to fill our lives. So for example, malware with moderate antivirus detection that only looks for credit card data and point of sale services may indicate a moderately resourced attacker who is likely criminally motivated.

Thatโ€™s a fairly well-prepared example. As well as the slightly bumbling phishing emails weโ€™ve all encountered, cyber criminals can also come in two particularly dangerous forms:

o A) The silent attacker โ€“ cyber criminals may lay silently within an enterprise for months, biding their time until itโ€™s the right moment to attack. Since some malware can edit its code once installed to mask its presence, these quiet lurkers embed themselves on a network to gather sensitive data in secret, either extracting personal details or monitoring communications, constantly feeding the results back while they wait for the opportune moment to strike.

o B) Sophisticated cyber criminals – on other occasions, the strategy of threat actors transitions from watching to attack. The tools in use are getting to sci-fi levels of sophistication. Highly resourced fraudsters can now use custom malware that surreptitiously replicates itself to thumbdrives to jump air-gapped networks and automatically looks for and collects documents with the keyword โ€œSECRETโ€. Anything you try to hide is all the more likely to be found.

Not all adversaries are created equal and intent is rarely consistent across the board. For example, if your adversary is driven by espionage then you wouldnโ€™t expect to see any defacement or ransomware activity. Instead, you need to be wary of sensitive information leaving your network.

Organisations that have a strong understanding of their adversaries and can develop persona-based intelligence capabilities will be better placed to automate their security operations, mitigate threats faster and adapt more quickly. Many question whether adversary intelligence is really a must-have, but knowing what they are up against will allow organisations to build more comprehensive mitigation strategies at a tactical level.

Website | + posts

Lead Editor for "Future Story Of" an exciting new brand coming soon!
Social Media Manager for Compare the Cloud and Disruptive Live.

Fluent in French, would like to live in a castle, owns a french bulldog called Pepper Pig.

Unlocking Cloud Secrets and How to Stay Ahead in Tech with James Moore

Newsletter

Related articles

How AI is Transforming Customer Communication Management

Business communication has evolved over the years. Today, it's...

Investment Opportunities for Startups and Technologies in AIย 

Although artificial intelligence developed from niche technology has become...

Four Surprising Lessons I’ve Learned Leading Tech Teams

Techies. Geeks. Boffins. Whatever your organisation calls its IT...

A Business Continuity Cheat Sheet

Right, let's be honest. When you hear "business continuity,"...

Challenges of Cloud & Ultima’s Solution to Transform Business

With the way that AWS and Microsoft dominate technology...