Cybersecurity Lesson 2: Threat Types

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following is NOT a common motivation for threat actors?

  • Chaotic motivations
  • Environmental motivations (correct)
  • Political motivations
  • Financial motivations

What is a common tactic used by nation-state actors to gain an advantage?

  • Using open-source intelligence to gather information
  • Launching phishing attacks to steal financial data
  • Deploying ransomware to disrupt critical infrastructure
  • Exploiting vulnerabilities in software to gain remote access and exfiltrate data (correct)

What is the main characteristic that differentiates a 'lone hacker' from a 'script kiddie'?

  • Access to resources
  • Level of technical expertise (correct)
  • Experience
  • Motivation

Which of the following is a unique characteristic of an Advanced Persistent Threat (APT)?

<p>The ability to remain undetected for extended periods (D)</p> Signup and view all the answers

What is the difference between an internal and external threat?

<p>Internal threats originate from within an organization, while external threats originate from outside the organization. (B)</p> Signup and view all the answers

How do 'hacktivists' differ from 'lone hackers'?

<p>Hacktivists are motivated by political or social causes, while 'lone hackers' are motivated by personal gain. (A)</p> Signup and view all the answers

Which of the following is NOT a common strategy employed by threat actors?

<p>Physical destruction (A)</p> Signup and view all the answers

What is the primary goal of a 'whistleblower' as a threat actor?

<p>To expose illegal or unethical activities within an organization. (D)</p> Signup and view all the answers

What is one primary motivation for organized crime to engage in cyber activities?

<p>To generate financial profits (D)</p> Signup and view all the answers

What is considered a 'shadow IT' threat within an organization?

<p>The use of personal devices for work purposes without proper security oversight (C)</p> Signup and view all the answers

What is the primary difference between a malicious internal threat and an unintentional insider threat?

<p>The intent and knowledge of the threat actor regarding their actions (B)</p> Signup and view all the answers

Which of the following is NOT a potential motivation for a threat actor?

<p>Service disruption (A)</p> Signup and view all the answers

Which type of actor would be most likely to use a combination of cyber espionage and disinformation tactics?

<p>Competitors (C)</p> Signup and view all the answers

What is the main characteristic that defines the attack surface of an organization?

<p>The points where an attacker can discover or exploit vulnerabilities within the organization (C)</p> Signup and view all the answers

Which of these is NOT a category of threat vector?

<p>User interface (C)</p> Signup and view all the answers

What is the primary reason why organizations face challenges in patching vulnerable software?

<p>The complexity and time-consuming nature of patching processes (B)</p> Signup and view all the answers

What social engineering technique involves impersonating someone else to gain access to information or systems?

<p>Impersonation (C)</p> Signup and view all the answers

What social engineering technique involves exploiting situations where identity proofing is difficult?

<p>Pretexting (A)</p> Signup and view all the answers

What type of social engineering attack primarily targets individuals within specific organizations?

<p>Business email compromise (A)</p> Signup and view all the answers

Which of the following is NOT a passive social engineering technique?

<p>Vishing (C)</p> Signup and view all the answers

What type of attack involves compromising a third-party site that the target frequently visits?

<p>Watering hole attack (C)</p> Signup and view all the answers

Which of the following social engineering tactics involves using text messages to deceive users?

<p>SMiShing (B)</p> Signup and view all the answers

Which social engineering technique involves creating convincing fake messages and websites to impersonate a brand or organization?

<p>Brand impersonation and disinformation (C)</p> Signup and view all the answers

Which of the following is NOT a common social engineering tactic used in a business email compromise attack?

<p>Creating fake websites that look like legitimate ones (C)</p> Signup and view all the answers

What is the primary characteristic of a 'Lure-based Vector' attack?

<p>Offering enticing content to trick the victim into action (C)</p> Signup and view all the answers

Which of the following is NOT a common network vector for attackers?

<p>Sending a malicious email with a phishing link (D)</p> Signup and view all the answers

Which of the following is a key aspect of a supply chain attack surface?

<p>Exploiting vulnerabilities in the design, manufacturing, or distribution process (C)</p> Signup and view all the answers

What is the difference between 'remote' and 'local' exploit techniques in the context of network vectors?

<p>Remote techniques exploit vulnerabilities from a distance, while local techniques require direct physical access to the target system. (A)</p> Signup and view all the answers

What is the key difference between a 'Trojan Horse' malware and a document file with a malicious macro?

<p>A Trojan Horse masks as a legitimate program, while a malicious macro is hidden within a document. (A)</p> Signup and view all the answers

Which of the following BEST describes the role of 'default credentials' in network security?

<p>They are often used by attackers to gain unauthorized access to devices. (D)</p> Signup and view all the answers

What is the main function of a 'vulnerability scanner' in a network security context?

<p>To proactively identify security vulnerabilities in software and systems. (A)</p> Signup and view all the answers

Which of these is NOT a common method for malicious actors to deliver malware through 'message-based vectors'?

<p>Exploiting vulnerabilities in the network infrastructure to spread malware. (A)</p> Signup and view all the answers

Flashcards

Organized Crime

Criminal groups operating across legal jurisdictions motivated by profit.

Competitors in Cybersecurity

Actors engaging in cyber espionage, disinformation, and insider threats.

Malicious Internal Threat

Authorized individuals who exploit access for sabotage or gain.

Unintentional Insider Threat

Individuals who pose risk due to ignorance or poor practices.

Signup and view all the flashcards

Threat Actor Attributes

Characteristics defining threat actors, including sophistication and motivation.

Signup and view all the flashcards

Attack Surface

All points in an organization where vulnerabilities can be exploited.

Signup and view all the flashcards

Threat Vectors

Methods used by attackers to exploit vulnerabilities in systems.

Signup and view all the flashcards

Vulnerable Software

Software that contains faults and is difficult to patch or support.

Signup and view all the flashcards

Threat Actor

An individual or group that poses a potential threat by exploiting vulnerabilities.

Signup and view all the flashcards

Internal Threat

Threats originating from individuals within an organization who have authorized access.

Signup and view all the flashcards

High Capability Actors

Threat actors who possess advanced skills to develop new attacks, often with significant resources.

Signup and view all the flashcards

Opportunistic Attack

An attack that targets vulnerabilities as they arise, often without a specific agenda.

Signup and view all the flashcards

Script Kiddies

Unskilled hackers who use existing tools to launch attacks without understanding the underlying technology.

Signup and view all the flashcards

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack where an attacker gains access to a network and remains undetected.

Signup and view all the flashcards

Financial Motivation

A reason for cybercrime that involves monetary gain, such as through blackmail or fraud.

Signup and view all the flashcards

Hacktivist

An individual or group that uses hacking to promote political agendas or social change.

Signup and view all the flashcards

Agentless

Characteristic of automated vulnerability scanners that do not require installation agents.

Signup and view all the flashcards

Network Vectors

Techniques for exploiting vulnerabilities through network access, including local and remote methods.

Signup and view all the flashcards

Lure-based Vectors

Techniques that entice targets into exposing themselves, like using bait or malicious files.

Signup and view all the flashcards

Supply Chain Attack Surface

The entire process from design to distribution that can be exploited by attackers.

Signup and view all the flashcards

Default Credentials

Factory-set usernames and passwords that are easily exploitable if not changed.

Signup and view all the flashcards

Trojan Horse Malware

Malicious software disguised as legitimate software, tricking users into execution.

Signup and view all the flashcards

Message-based Vectors

Methods of exploitation using communication channels like email or social media.

Signup and view all the flashcards

Open Service Port

Network ports that are accessible and can be exploited if not properly secured.

Signup and view all the flashcards

Social Engineering

Manipulating people to divulge confidential information or perform actions that compromise security.

Signup and view all the flashcards

Impersonation

Pretending to be someone else to gain information or access.

Signup and view all the flashcards

Pretexting

Creating a scenario to obtain information by exploiting trust in identity.

Signup and view all the flashcards

Phishing

Tricking a target into using a malicious resource by masquerading as a legitimate source.

Signup and view all the flashcards

Vishing

Phishing conducted over voice communication, often via phone calls.

Signup and view all the flashcards

SMiShing

Phishing attacks executed through SMS text messaging.

Signup and view all the flashcards

Typosquatting

Creating similar domain names to mislead users to a malicious site.

Signup and view all the flashcards

Business Email Compromise

Targeted attack that involves phishing specific individuals to impersonate trusted contacts.

Signup and view all the flashcards

Study Notes

Lesson 2: Comparing Threat Types

  • This lesson covers different threat actors, their attributes, motivations, and associated attack vectors and surfaces.
  • Objectives include comparing and contrasting threat actor attributes and motivations, as well as explaining common threat vectors and attack surfaces.
  • A vulnerability, threat, and risk model explains how these factors relate to risk calculation.

Topic 2A: Threat Actors

  • Threat actors can be categorized in many ways. Known threats and adversary behaviors differ, as do internal/external threats.
  • Internal threats already have authorized access. The attribute of the threat actor, not the attack location, is key.
  • Sophistication levels influence tools used. Low-capability actors use readily available tools, while high-capability actors can develop new attacks for political or military assets.

Motivations of Threat Actors

  • Threat actors can be motivated by malicious intent (targeted attacks) or opportunism (opportunistic attacks). Accidental/unintentional actions are also possibilities.
  • Strategies include service disruption, data exfiltration, and disinformation.
  • Motivations include chaotic actions (e.g., vandalism), financial gain (e.g., blackmail, extortion, and fraud), and political motivations (e.g., whistleblowers, campaigns, nation-state actors).

Hackers and Hacktivists

  • "Lone Hacker" types include white hats (ethical hackers) and black hats (malicious hackers).
  • Categories exist for authorized vs. non-authorized attackers.
  • Unskilled attackers may use "script kiddie" tactics.

Nation-State Actors and Advanced Persistent Threats (APTs)

  • Nation-state actors, attached to military/secret services, have a high capability level.
  • APTs are known for espionage and strategic advantage, with deniability and false flag operations as common methods.

Organized Crime and Competitors

  • Organized crime often operates across legal jurisdictions and is motivated by criminal profit.
  • They can be well-resourced and funded.
  • Cyber espionage and disinformation are common activities; competitors can combine with insider threats.

Internal Threat Actors

  • Malicious insiders have authorized access and can cause sabotage, financial loss, or business advantage.
  • Unintentional insider threats stem from weak policies/procedures, lack of training, or shadow IT.

Topic 2B: Attack Surface

  • Attack surfaces are areas where attackers can discover and exploit vulnerabilities in physical, network, application, and human systems.
  • Attack surfaces can span broad organization scopes or be narrowed to a single system.
  • High-capability actors can expand attack surfaces by developing novel attack vectors.

Vulnerable Software Vectors

  • Vulnerabilities in software (faulty code/design issues or delayed patching) are common attack entry points.
  • Unsupported systems and applications often lack updates/security patches.
  • Client-based vs. agent-based vulnerability scanners have different functionalities.

Network Vectors

  • Exploits can target remote or local network systems.
  • Lack of confidentiality, integrity, and availability can create weaknesses.
  • Physical (wired) and wireless network access, cloud services, Bluetooth, default credentials, and open ports are common vulnerabilities in networks.

Lure-based Vectors

  • Lure-based vectors entice victims into opening malicious files (executable files, Trojan horses), clicking links in documents (macro/scripting files), or opening image files.

Message-based Vectors

  • Attack vectors such as email, SMS, IM, web/social media, and voice calls can all be used to spread malicious content.

Supply Chain Attack Surface

  • Supply chain attack surfaces encompass the entire process of designing, manufacturing, and distributing goods and services.
  • Procurement management, suppliers, vendors, and business partners impact the overall complexity of supply chains.
  • Effective defense strategies must account for the potential for threat actors to leverage supply chain access points

Review Activity: Attack Surface (Summary)

  • Attack vectors and attack surfaces must be considered for all these topics

Review Activity: Threat Actors (Summary)

  • Identifying different threat actors, their attributes, and motivations is essential to develop an effective security strategy.

Topic 2C: Social Engineering

  • "Hacking the human" is a core social engineering principle.
  • Purposes of social engineering include reconnaissance, eliciting information, and gaining unauthorized access.

Human Vectors

  • Social engineering techniques can be used to persuade targets to take actions, such as opening malicious files.
  • Tactics include contact with help desks and gaining access to premises and installing monitoring devices.

Impersonation and Pretexting

  • Impersonation aims to pretend to be someone else, employing persuasion techniques.
  • Pretexting exploits situations where identity verification is not robust or to gain additional information.

Phishing and Pharming

  • Phishing techniques trick users into entering credentials on fraudulent websites.
  • Phishing takes advantage of trusted communications and websites.
  • Vishing and SMiShing use voice calls and text messages to conduct phishing schemes respectively.
  • Pharming redirects users to fake websites via DNS spoofing.

Typosquatting

  • Typosquatting makes phishing messages more convincing by creating look-alike or similar websites to trusted websites.
  • This is frequently done through email spoofing practices, including from field confusion tactics.

Business Email Compromise

  • Targets are often specific individuals within a company.
  • Posing as colleagues, business partners, or vendors creates trust and enables the threat actor to gain entry.
  • Brand impersonation, disinformation, and watering hole attacks leverage fake websites and correspondence.

Review Activity: Social Engineering (Summary)

  • Social engineering techniques are used to exploit human vulnerabilities, focusing on impersonation, pretexting, phishing, and pharming to manipulate users into divulging information or executing malicious tasks.
  • These techniques may include typosquatting and business email compromise.

Lab Activity (Multiple)

  • Lab activities are designed for practical application, such as finding open service ports and using tools to demonstrate social engineering techniques.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Evolution of Web Security
5 questions
Cybersecurity Threat Actors Overview
10 questions
Cybersecurity Threat Actors Overview
38 questions
Use Quizgecko on...
Browser
Browser