Skip to content

Latest commit

 

History

History
12 lines (12 loc) · 2.05 KB

PotentialThreatActors.md

File metadata and controls

12 lines (12 loc) · 2.05 KB
Threat Actor Motivation Potential Attack Vectors Possible Impact
Cybercriminals Financial gain - Phishing emails
- Ransomware
- SQL injection
- Stolen credentials
- Data breach
- Financial loss
- Reputation damage
Nation-state actors Intelligence gathering,
Economic espionage
- Advanced Persistent Threats (APTs)
- Zero-day exploits
- Social engineering
- Intellectual property theft
- Competitive disadvantage
- National security implications
Insiders Revenge, Financial gain - Data exfiltration
- Sabotage
- Unauthorized access
- Data leakage
- Operational disruption
- Compliance violations
Hacktivists Ideological, Political - DDoS attacks
- Website defacement
- Doxing
- Service interruption
- Reputational damage
- Public relations crisis
Competitors Competitive advantage - Corporate espionage
- Insider recruitment
- Data theft
- Loss of market share
- Compromised strategies
- Intellectual property loss
Organized crime Financial gain,
Drug trafficking
- Identity theft schemes
- Insurance fraud
- Prescription data theft
- Financial losses
- Legal liabilities
- Regulatory scrutiny
Opportunistic hackers Curiosity, Skill testing - Vulnerability scanning
- Brute force attacks
- Exploiting misconfigurations
- System breaches
- Data exposure
- Reputational damage
Third-party risks Various (depends on third party) - Supply chain attacks
- API vulnerabilities
- Shared infrastructure exploits
- Data breaches
- Service disruptions
- Compliance violations
Social engineers Financial gain,
Information gathering
- Phishing
- Pretexting
- Baiting
- Credential compromise
- Data theft
- Financial fraud
Terrorist organizations Disruption, Panic - Critical infrastructure attacks
- Data manipulation
- Insider placement
- Loss of life
- Massive service disruption
- Public panic