Loading content...
Effective defense requires understanding the adversary. While the previous page examined what threats exist, this page addresses who creates those threats. The network security field refers to these malicious actors as threat actors or, more colloquially, attackers.
Attackers are not a monolithic group. They range from curious teenagers exploring systems to nation-state intelligence agencies conducting strategic operations. Each category of attacker brings different motivations, capabilities, resources, and behavioral patterns. Designing appropriate defenses requires understanding these differences—the security controls needed to stop a opportunistic criminal are vastly different from those required against a persistent nation-state adversary.
This page provides a rigorous taxonomy of threat actors, examining their characteristics, motivations, typical techniques, and the implications for defensive strategy. By understanding who attacks networks and why, security professionals can make informed decisions about risk prioritization and control investment.
By the end of this page, you will be able to: (1) Identify and characterize the major categories of threat actors, (2) Understand the motivations driving different attacker types, (3) Assess attacker capability levels and resource availability, (4) Recognize attack patterns associated with different adversary types, and (5) Apply adversary understanding to defensive prioritization.
Before examining specific attacker categories, we need a framework for analyzing any threat actor. Security professionals evaluate adversaries along several key dimensions:
1. Motivation (Intent) What does the attacker want? Financial gain, espionage, sabotage, ideology, curiosity, or reputation? Understanding motivation helps predict targets and behaviors.
2. Capability (Skills and Resources) What can the attacker do? This includes technical skills, available tools, human resources, financial backing, and access to zero-day exploits or insider assistance.
3. Opportunity (Access and Timing) What access vectors are available to the attacker? Can they reach the target network? Do they have insider access or must they attack externally?
4. Intent Stability How committed is the attacker? Will they persist through defensive resistance, or move to easier targets? This determines the appropriate defensive response.
5. Attribution Tolerance How much do they care about being identified? Nation-states may accept attribution risk for strategic objectives; criminals typically prefer anonymity.
| Dimension | Low End | High End | Security Implication |
|---|---|---|---|
| Capability | Script kiddies using public tools | APT groups with zero-day arsenals | Higher capability = need defense-in-depth, not just perimeter |
| Resources | Solo actors with personal computers | State agencies with unlimited budgets | Higher resources = attacker can persist and adapt |
| Targeting | Opportunistic scanning for any victim | Specific targeting of your organization | Specific targeting = assume customized attack |
| Persistence | Moves on after first failure | Continues for months/years | High persistence = detection and response critical |
| Stealth Priority | Noisy attacks, doesn't care about detection | Sophisticated evasion, long-term covert access | High stealth = invest in behavioral detection |
Use this framework when conducting threat modeling for your organization. Ask: Who would want to attack us? What would they want? What capabilities might they have? The intersection of your valuable assets with specific threat actor profiles defines your realistic threat landscape—which should drive security investments.
Script kiddies represent the entry-level of the threat actor spectrum. The term (sometimes considered pejorative) describes individuals who use pre-built attack tools without deep understanding of the underlying techniques. While often dismissed as minor threats, they account for a significant volume of attack traffic and can cause real damage to unprotected systems.
Typical Attack Patterns:
Defensive Implications:
Protection against script kiddies focuses on security hygiene basics:
Organizations that fail to implement these basics will be compromised by script kiddies, regardless of whether more sophisticated threats are present.
While individually unsophisticated, script kiddies generate massive attack volume. Internet-facing systems receive thousands of automated scans and exploit attempts daily. Security controls must efficiently filter this noise to preserve analyst attention for genuine sophisticated threats. Defense against script kiddies is table stakes—not optional.
Cybercriminals represent a substantial escalation in threat severity. Unlike novice attackers driven by curiosity, cybercriminals are motivated by financial profit and often operate as organized businesses. The cybercrime economy has professionalized, with specialized roles, service providers, and marketplaces creating a sophisticated underground ecosystem.
The Cybercrime Ecosystem:
Modern cybercrime operates as a sophisticated marketplace with specialized roles:
Initial Access Brokers — Specialists in gaining access to corporate networks (via phishing, exploitation, or credential theft) who sell access to other criminals
Malware Developers — Create and maintain malicious tools (ransomware, trojans, exploits) sold or licensed to attackers
Infrastructure Providers — Offer bulletproof hosting, VPN services, and botnet rental for conducting attacks
Money Mules — Handle financial transactions and laundering to extract value from stolen funds
Operators/Affiliates — Execute attacks using purchased/rented tools and access
This specialization means attackers don't need deep technical skills in every area—they can purchase capabilities as services. The barrier to sophisticated attacks has dramatically lowered.
| Attribute | Typical Characteristics | Defensive Response |
|---|---|---|
| Skill Level | Moderate to high; can use sophisticated tools effectively | Need more than basic defenses; assume tool competence |
| Resources | Significant; organized groups have substantial funds | Must match with appropriate security investment |
| Persistence | Medium; will work targets showing promise but move on from hard targets | Raising security bar can deter, unlike nation-states |
| Targeting | Often opportunistic but increasingly targeted for high-value victims | Both perimeter security and targeted defense needed |
| TTPs | Phishing, vulnerability exploitation, credential theft, malware deployment | Email security, patch management, EDR critical |
Ransomware represents the most impactful cybercriminal threat. Median downtime from ransomware attacks exceeds 2 weeks. Average total cost (including recovery, lost revenue, and sometimes ransom payment) exceeds $1 million for enterprises. Prevention requires excellent backup, network segmentation, endpoint detection, and user awareness. Recovery requires tested, offline backups and incident response plans.
Hacktivists are threat actors motivated by political, social, or ideological goals rather than financial gain. The term combines "hacker" and "activist," describing individuals or groups who use cyber attacks to promote their cause, protest perceived injustices, or punish organizations they oppose.
Historical Context:
Hacktivism emerged in the 1990s with groups like the Cult of the Dead Cow and later Anonymous. The movement gained global prominence in the 2010s with high-profile operations against governments, corporations, and other organizations. While activity levels fluctuate, hacktivism resurges during major political events, conflicts, and social movements.
Key Characteristics:
Typical Hacktivist Tactics:
Distributed Denial of Service (DDoS) — Most common tactic; temporarily overwhelm target websites to deny access. Relatively low skill required for participation.
Website Defacement — Replacing target website content with protest messages. Visual, shareable, and embarrassing for victims.
Data Leaks (Doxing) — Stealing and publicly releasing internal documents, emails, or personal information to expose perceived wrongdoing.
Account Takeovers — Compromising social media accounts to post protest messages to the target's audience.
Strategic Embarrassment — Attacks designed to damage reputation rather than extract value (unlike criminal data theft).
Risk Assessment Factors:
Hacktivist risk varies significantly based on organizational profile:
High risk: Organizations in controversial industries (oil/gas, defense, controversial agriculture), companies involved in high-profile political issues, organizations that have publicly conflicted with hacktivist values
Lower risk: Low-profile organizations without controversial business practices or political involvement
Hacktivism risk often spikes suddenly based on current events—organizations should monitor their position in ongoing controversies.
Some hacktivist groups receive support from nation-states, blurring the line between hacktivism and state-sponsored activity. Groups ostensibly independent may receive infrastructure, tools, or coordination from intelligence agencies. During international conflicts, 'patriotic hacker' groups often align with state interests. This complicates attribution and escalates capabilities beyond typical hacktivist levels.
Insider threats represent a fundamentally different challenge than external attackers. Insiders—employees, contractors, partners, or former personnel—already possess legitimate access within the security perimeter. They bypass many controls designed to keep out external threats and often have intimate knowledge of valuable targets and security gaps.
Insider threats divide into two essential categories:
Malicious Insiders: Individuals who intentionally abuse their access for personal gain, revenge, ideology, or on behalf of external parties. Their actions are deliberate and purposeful.
Negligent/Accidental Insiders: Well-intentioned individuals who cause security incidents through mistakes, poor judgment, or manipulation. They don't intend harm but create security breaches nonetheless.
Malicious insider motivations:
Financial gain: Selling company data, intellectual property, or customer information. May involve external buyers (competitors, criminals, foreign governments).
Revenge: Disgruntled employees sabotaging systems or leaking embarrassing information after conflicts, termination, or perceived mistreatment.
Ideology: Employees who disagree with company practices (environmental, political, ethical) may leak information to activists or journalists.
Espionage: Employees recruited by competitors or foreign intelligence to steal specific information over extended periods.
Fraud: Using access to manipulate financial systems, approve fraudulent transactions, or embezzle funds.
Warning indicators:
Notable example: Edward Snowden, a contractor for the NSA, used his system administrator access to collect and leak classified documents about surveillance programs. He exploited legitimate access, not technical vulnerabilities.
Insider threats scale with privilege level. A malicious or compromised administrator can cause far more damage than an entry-level employee. Privileged access management (PAM), separation of duties, and audit logging are essential controls. The 'principle of least privilege' isn't just good practice—it's critical insider threat mitigation.
Nation-state actors represent the apex of the threat actor hierarchy. These are cyber capabilities operated by or on behalf of government intelligence agencies and military organizations. They possess the most sophisticated capabilities, the largest budgets, and pursue strategic objectives at the national level.
Why nation-states conduct cyber operations:
Defining Characteristics of Nation-State Operations:
Unlimited Resources: Nation-states have functionally unlimited budgets for cyber operations. They employ hundreds or thousands of specialized personnel. They can afford to spend years on a single target. They maintain inventories of zero-day exploits purchased or developed in-house.
Strategic Patience: Unlike criminals seeking quick returns, nation-states pursue long-term objectives. Initial access may be maintained covertly for years before being utilized. Operational security is meticulous to avoid burning access prematurely.
Sophisticated Tradecraft: Operations employ advanced techniques: custom malware, living-off-the-land tactics, supply chain compromises, and exploitation of operational technology. Attack chains may involve multiple stages of compromise.
Legal and Diplomatic Cover: State actors operate with explicit or implicit government sanction. They face no prosecution in their home country. Diplomatic consequences may be limited. This creates asymmetric risk compared to other threat actors.
Notable State Actor Groups:
APT28/APT29 (Russia): Associated with GRU and FSB intelligence services; responsible for DNC hack, SolarWinds compromise, and extensive espionage operations
APT41 (China): Combines state-sponsored espionage with financially-motivated cybercrime; extensive intellectual property theft
Lazarus Group (North Korea): Responsible for Sony Pictures attack, WannaCry ransomware, and major cryptocurrency thefts funding state programs
APT33/APT34 (Iran): Targeting critical infrastructure, energy sector, and conducting destructive wiper attacks (Shamoon)
Most organizations cannot defend against determined nation-state adversaries with unlimited resources and patience. However, many can raise the cost of attack enough to not be the path of least resistance. Defense focuses on: making attacks expensive (requiring expensive exploits), maximizing detection probability (increasing risk of exposure), limiting blast radius (reducing value of compromise), and building resilience (ability to recover from successful attacks).
Corporate espionage represents a threat category that bridges criminal, insider, and sometimes nation-state threats. Competitors—domestic or international—may seek unauthorized access to proprietary information to gain market advantage. This ranges from individual employees stealing trade secrets to sophisticated corporate intelligence operations.
Valuable targets for corporate espionage:
Methods employed:
Legal gray areas:
Corporate espionage exists on a spectrum from clearly illegal to questionable to legitimate competitive intelligence:
Special concern: State-backed corporate espionage
Some nations conduct economic espionage on behalf of domestic industries using government intelligence capabilities. This dramatically escalates the threat level facing companies, particularly in technology, aerospace, pharmaceuticals, and other high-value sectors. Companies may face sophisticated nation-state attacks motivated by competitor advantage rather than traditional espionage objectives.
Corporate espionage defense includes: strict trade secret policies and employee agreements, departure interviews and monitoring of data access before employee exits, information classification and access controls for competitive secrets, counterintelligence awareness for public-facing employees, and security for sensitive discussions (procurement, strategy, M&A).
We've surveyed the spectrum of threat actors—from script kiddies running automated tools to nation-state intelligence agencies conducting strategic operations. Each category brings different motivations, capabilities, and behaviors that inform appropriate defensive responses.
| Actor Type | Motivation | Capability | Persistence | Primary Defense |
|---|---|---|---|---|
| Script Kiddies | Curiosity, ego | Low | Low | Security hygiene |
| Cybercriminals | Financial | Medium-High | Medium | Layered security |
| Hacktivists | Ideology | Variable | Campaign-based | Monitoring, DDoS protection |
| Insiders | Various | Access-based | Opportunistic | IAM, monitoring, culture |
| Nation-States | Strategic | Very High | Very High | Defense-in-depth, resilience |
| Competitors | Business advantage | Variable | Targeted | IP protection, CI |
With threat types and attackers now understood, we next examine the weaknesses that attackers exploit. The following page explores vulnerabilities—the technical, configuration, and human weaknesses that create attack opportunities. Understanding vulnerabilities connects attacker capabilities to actual compromise scenarios.