Risks are everywhere. Online, in real life. Digital transformation and the rapid integration of cloud-based technologies has been met with an unprecedented increase in cybersecurity risks. In most cases, standard cybersecurity best practices and a strong mechanism for Identity and Access Management will take care of most exploits, vulnerabilities and human errors that lead to a data leak.
But what about the Advanced Persistent Threats (APTs) and DDoS attacks coming from organized cybercriminals and nation-state actors with a political or social agenda?
Knowing the source of these attacks can help you determine the scope of risk and prepare a strategic defense against a variety of threat actors, ranging from hacktivists and script kiddies to the more sophisticated cybercrime underground rings and state-sponsored attackers.
Let’s take a look
Threat actors refer to the person, persons or entities responsible for causing cybersecurity incident or more generally posing a cybersecurity risk. This is a broad definition that can encompass a range of entities, including those that are:
The definition also assumes some baseline threshold of risk: a data-driven organization in a tightly regulated industry vertical may have a different outlook for cybersecurity risk than a new startup firm developing MVPs for their latest innovation ideas. Both organizations may perceive cybersecurity threats from a broad spectrum of actors and therefore adopt defensive measures accordingly.
So, let’s review in detail the key characteristics of various cybersecurity threat actors and the best practices on dealing with them:
These are opportunist hackers who may take advantage of a known vulnerability and use existing tools and hacking scripts to bypass basic authorization controls such as passwords and ping exposed network endpoints. The intention behind these attacks is usually to gain:
They are generally inexperienced and therefore may not intend to cause significant financial harm to a business organization.
Hacktivists are groups of experienced cybercriminals that conduct cybercrime operations as part of a political or social agenda — hence the “activist” part of the name. Their primary objective is to gain recognition on a larger scale.
Once their voice is heard among the public, they tend to instill fear among the victims regarding exposure of sensitive personally identifiable information and loss of an essential service such as utilities and healthcare. Therefore, they commonly target large organizations involved in the public service, utility companies as well as organizations with a large user base or public following — anywhere they can reach a large audience.
Popular hacktivist groups such as Anonymous and LulzSec have conducted a range of high profile attacks against media outlets and tech companies.
(Understand ransomware families, another way of categorizing ransomware attacks.)
State-sponsored attackers are entities with the backing of a nation state or defense organization. The targets are generally the competing or rival nations in the political, economic or strategic security space.
Specifically, they may conduct direct cyberattacks to a utilities provider or defense organization of a target state, or install backdoor channels to technologies exported to other nations. The Stuxnet exploit is a popular cyberweapon used in a state-sponsored attack that destroyed a centrifuge in the nuclear plant.
(Go deep into Stuxnet and other major attacks in our recommended security reads & podcasts.)
These are the users with authorized access to sensitive business information and system resources who either:
According to research, over 80% of the cyber-attacks occur due to human involvement — mostly in the form of unintentional security malpractices adopted at the company. This type of internal human involvement is known as an insider threat.
For malicious actors that lack the capabilities necessary to conduct a cyber-attack, they can engage cybercriminals for hire in the Dark Web cybercrime underground markets. This is where a variety of cybercrime tools and services are sold in exchange for money. Hacking groups openly advertise their attributes, resources and tools with guaranteed results and payment upon proven, visible outcomes. For example, a DDoS attack can cost $5 an hour.
(Learn how cybercrime as a service works.)
So how do you defend against these attacks? In addition to the standard security best practices such as using strong authentication systems such as multi-factor authentication, frequent password updates, a general awareness against social engineering attacks and a guideline for cybersecurity best practices, business organizations must take additional measures depending on the threat actors.
Three main categories of security best practices against these threat actors include:
At Splunk, our purpose is to build a safer and more resilient digital world. Every day, we live this purpose by helping security, IT and DevOps teams keep their organizations securely up and running. When organizations have resilient digital systems, they can adapt, innovate and deliver for their customers.
Explore Splunk solutions for cybersecurity, including with Splunk Enterprise Security, our industry leading SIEM. Better yet? Take a free tour!
See an error or have a suggestion? Please let us know by emailing ssg-blogs@splunk.com.
This posting does not necessarily represent Splunk's position, strategies or opinion.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.