Types of Threat Actors
Social Engineering
MALWARE
MISC.
Network Devices
100

More technically competent than script kiddies; account for 8-12% of malicious Internet activity. Work together for a “common cause”

Hacktivist

100

posing as a trusted source, attempt to deliver malicious payload or get personal/sensitive info using bait.

Phishing

100

Code that runs on a computer without the users knowledge and infects the computer when the code is accessed and executed

Virus

100

Device that allows device charging but prevents transfer of data.

USB Blocker

100

The process of changing an IP address while it is in transit across a router.  Often used so one larger address space (private) can be remapped to another address space or single IP.

Network Address Translation (NAT)

200

Not highly technical, but are savvy enough to run scripts written by others

Script Kiddie

200

Targeting a particular user or group

Spear Phishing

200

Malware that imitate a trusted program 

Trojan

200

Considered the "gold standard" of data destruction.

Burning

200

Network device that is a one stop shop for security, normally located on edge of the network to manage traffic in and out of that network

Unified Threat Management (UTM)

300

Very patient – willing to wait for the right situation and opportunity to attack “low and slow” using Advanced Persistent Threats

Nation States

300

Following someone through a limited entry door

Tailgating

300

Allows attacker to record system configuration and user actions. Key logging, screenshots, remote logging.etc

Spyware

300

Type of industrial monitoring device that uses real-time to monitor things like gas lines, nuclear power plant conditions, or municipal water systems.

SCADA (Supervisory Control and Data Acquisition)

300

Acts as a VPN endpoint, providing a method of managing multiple separate VPN conversations, each isolated from the others and converting each encrypted stream to its unencrypted, plaintext form, on the network

VPN concentrator

400

Operate across legal jurisdiction and motivated by criminal profit

Organized Crime

400

Infected website used to infect other systems simply by visiting the website

Watering Hole

400

A self-spreading malware that exploit system and application vulnerabilities to move between systems and require no user interaction to exploit a system

Worm

400

By passing the App store on iOS device in order to run apps not approved

Jailbreaking

400

Network device that identifies and responds to threats immediately 

Network Intrusion Prevention System (NIPS)

500

A person who Had or has had authorized access to company network that uses sabotage for financial gain or business advantage

Malicious Insider Threat

500

Spam that is done over instant messaging

SPIM

500

Malicious program that executes during boot-up and replaces key system files and utilities.

Root Kit

500

LDAPS port number

389

500

Hardware device that manages or stores encryption keys and can assist with encryption, hashing, or application of digital signatures.

Hardware Security Module

M
e
n
u