enespt-br
Glossary

Threat Actor

An individual, group, or organization that conducts cyberattacks. Threat actors have varying motivations, capabilities, and targeting patterns.

Definition

A Threat Actor is any entity responsible for conducting cyberattacks. This includes:

  • Nation-states – Government-sponsored groups conducting espionage, sabotage, or warfare
  • Cybercriminals – Individuals or gangs conducting attacks for financial gain
  • Hacktivists – Groups motivated by ideology or social causes
  • Insiders – Employees or contractors conducting attacks from within
  • Script kiddies – Inexperienced individuals using publicly available tools

Threat Actor Categories

Nation-State Actors (APTs)

Advanced Persistent Threat (APT) groups sponsored by governments, typically with:

  • High technical sophistication
  • Long-term persistence and patience
  • Access to advanced tools and exploits
  • Motivation: espionage, sabotage, cyberwarfare
  • Examples: APT28 (Russia), APT1 (China), Lazarus (North Korea)

Cybercriminal Groups

Organized groups conducting attacks for financial gain:

  • Ransomware gangs
  • Banking trojans operators
  • Card fraud rings
  • Motivation: direct financial profit
  • Examples: LockBit, Evil Corp, FIN7

Hacktivists

Groups motivated by ideology or activism:

  • Anonymous, LulzSec (examples)
  • Motivation: social or political causes
  • Variable technical skill

Insider Threats

Employees, contractors, or business partners:

  • May have legitimate system access
  • Motivation: financial gain, revenge, ideology
  • Often the most dangerous due to insider knowledge

Threat Actor Characteristics

Security teams profile threat actors across several dimensions:

Capability

  • Basic – Uses publicly available tools
  • Intermediate – Custom tools, some operational security
  • Advanced – Custom exploits, sophisticated infrastructure, strong OPSEC
  • Nation-state – Zero-days, advanced persistent capabilities

Motivation

  • Financial – Direct monetary gain (ransomware, fraud)
  • Espionage – Stealing intellectual property, state secrets
  • Disruption – Website defacement, service disruption
  • Sabotage – Causing damage to critical systems

Targeting Pattern

  • Indiscriminate – Targets anyone (opportunistic)
  • Industry-specific – Targets particular sectors
  • Geographically specific – Targets certain regions
  • Organization-specific – Targets specific companies

Tactics & Techniques

  • Documented through MITRE ATT&CK mappings
  • Shows how actors typically operate

Why Understanding Threat Actors Matters

Instead of treating all threats equally, organizations can:

  1. Prioritize Defense – Focus on tactics used by actors most likely to target you
  2. Predict Attack Patterns – Understanding an actor’s history predicts their future behavior
  3. Speed Incident Response – Recognizing an actor’s signature techniques enables faster analysis
  4. Allocate Resources – Invest in defenses against probable threats

Threat Actor Attribution

Attribution is the process of linking an attack to a specific threat actor. Attribution is difficult and requires:

  • Technical indicators (malware signatures, infrastructure)
  • Tactical indicators (techniques, tools, targeting patterns)
  • Strategic indicators (motivation, timing, geopolitical context)
  • Confidence assessment (high confidence, moderate confidence, low confidence)

Security researchers rarely claim 100% certainty; instead, they assign confidence levels: “with moderate confidence, we assess this attack was conducted by APT28.”

See Also