Threat actors

1.4 Compare and contrast threat-intelligence and threat-hunting concepts.

📘CompTIA CySA+ (CS0-003)


Understanding threat actors is very important for the CySA+ exam. A threat actor is any person or group that performs malicious activities against an organization’s systems, networks, or data.

Security analysts must understand:

  • Who the attacker is
  • Why they attack (motivation)
  • How skilled they are
  • What techniques they use
  • What impact they can cause

This knowledge helps with:

  • Threat intelligence analysis
  • Threat hunting activities
  • Incident response
  • Risk assessment

Below are all the threat actor types you must know for the CS0-003 exam.


1. Advanced Persistent Threat (APT)

Definition

An Advanced Persistent Threat (APT) is a highly skilled and well-funded attacker (usually a group) that gains unauthorized access to a network and stays there for a long time without being detected.

Key Characteristics

  • Advanced – Uses sophisticated tools and techniques
  • Persistent – Maintains long-term access
  • Targeted – Focuses on specific organizations
  • Stealthy – Avoids detection

Typical Goals

  • Steal sensitive data
  • Conduct cyber espionage
  • Disrupt operations
  • Gather intelligence over time

Techniques Used

  • Spear-phishing
  • Zero-day exploits
  • Malware with backdoors
  • Lateral movement
  • Privilege escalation
  • Data exfiltration

IT Environment Example

An APT group sends carefully crafted phishing emails to system administrators. After gaining access, they install a backdoor, escalate privileges, and quietly monitor internal email servers and file shares for months while stealing confidential documents.

Why It Matters for CySA+

  • APTs are often linked to nation-states.
  • They use multi-stage attacks.
  • Detection requires advanced monitoring and threat hunting.
  • Indicators may be subtle and long-term.

2. Hacktivists

Definition

Hacktivists are attackers who perform cyberattacks to promote political, social, or ideological causes.

Motivation

  • Political beliefs
  • Social activism
  • Religious or ideological goals

Common Attack Methods

  • Website defacement
  • Distributed Denial-of-Service (DDoS)
  • Data leaks (doxxing)
  • Social media account compromise

IT Environment Example

A hacktivist group launches a DDoS attack against a public-facing web server to make the company website unavailable. They may also replace the homepage with a message supporting their cause.

Skill Level

  • Can vary from moderate to high
  • Sometimes use tools developed by others

Exam Tip

Hacktivists are ideology-driven, not financially motivated.


3. Organized Crime

Definition

Organized crime groups conduct cybercrime primarily for financial gain.

Motivation

  • Money
  • Extortion
  • Fraud

Common Attacks

  • Ransomware
  • Business Email Compromise (BEC)
  • Credit card theft
  • Banking trojans
  • Phishing campaigns

IT Environment Example

A criminal group deploys ransomware across a company network. They encrypt file servers and demand payment in cryptocurrency to restore access.

Characteristics

  • Well-structured groups
  • Use Ransomware-as-a-Service (RaaS)
  • Operate like businesses
  • May have technical specialists

Exam Tip

If the scenario mentions:

  • Ransom demands
  • Large-scale fraud
  • Cryptocurrency payments
    → Think organized crime.

4. Nation-State

Definition

A nation-state threat actor is sponsored or supported by a government.

Motivation

  • Espionage
  • Political advantage
  • Military intelligence
  • Economic advantage
  • Cyber warfare

Capabilities

  • Extremely advanced tools
  • Zero-day exploits
  • Custom malware
  • Large budgets
  • Dedicated teams

IT Environment Example

A nation-state group targets a telecommunications provider to intercept sensitive communications or gain access to infrastructure data.

Differences from APT

  • Many nation-state attacks are APTs.
  • Not all APTs are officially confirmed as nation-state actors.
  • Nation-state refers to who sponsors the attack.
  • APT refers to how the attack is conducted.

Exam Tip

If the question mentions:

  • Government sponsorship
  • Military objectives
  • Long-term espionage
    → Likely nation-state.

5. Script Kiddie

Definition

A script kiddie is an inexperienced attacker who uses pre-made hacking tools without fully understanding how they work.

Skill Level

  • Low
  • Relies on automated tools
  • Limited technical knowledge

Motivation

  • Curiosity
  • Attention
  • Entertainment
  • Reputation

Tools Used

  • Public exploit kits
  • Downloaded malware
  • Automated vulnerability scanners

IT Environment Example

A script kiddie downloads a publicly available scanning tool and scans an organization’s web server for open ports or known vulnerabilities.

Exam Tip

If the attacker:

  • Uses public tools
  • Has low skill
  • Causes random or non-targeted attacks
    → Think script kiddie.

6. Insider Threat

An insider threat comes from within the organization.

This is one of the most dangerous threat types because insiders:

  • Already have authorized access
  • Understand internal systems
  • May bypass security controls

There are two types:


A. Intentional Insider Threat

Definition

An employee, contractor, or partner who deliberately abuses access.

Motivation

  • Revenge
  • Financial gain
  • Espionage
  • Sabotage

IT Environment Example

A system administrator copies confidential data from a database and sells it to a competitor.

Risk Factors

  • Disgruntled employees
  • Privileged users
  • Employees about to leave the company

B. Unintentional Insider Threat

Definition

An employee who causes harm accidentally.

Causes

  • Falling for phishing emails
  • Misconfiguring servers
  • Weak passwords
  • Sending data to wrong recipient

IT Environment Example

An employee enters their login credentials into a fake phishing website, giving attackers access to internal systems.

Exam Tip

If it is accidental → Unintentional insider
If it is malicious → Intentional insider


7. Supply Chain Threat

Definition

A supply chain threat occurs when attackers compromise a third-party vendor or service provider to gain access to the primary target.

Why It’s Dangerous

Organizations trust vendors and partners. If attackers compromise one vendor, they may gain access to multiple customers.

Attack Methods

  • Compromised software updates
  • Third-party service compromise
  • Managed service provider (MSP) breach
  • Hardware backdoors

IT Environment Example

An organization installs a trusted software update from a vendor. The update contains malicious code inserted by attackers who compromised the vendor’s development environment.

Exam Tip

If the attack originates from:

  • A vendor
  • A partner
  • A software provider
    → Think supply chain attack.

Comparing Threat Actors

Threat ActorSkill LevelMotivationTargetingExample Goal
APTVery HighEspionage, disruptionHighly targetedLong-term data theft
HacktivistModerateIdeologyPublic-facing systemsWebsite defacement
Organized CrimeHighFinancialBroad or targetedRansomware
Nation-StateExtremely HighPolitical/MilitaryStrategic targetsIntelligence gathering
Script KiddieLowCuriosity/FameRandomPort scanning
Insider (Intentional)VariesRevenge/MoneyInternal systemsData theft
Insider (Unintentional)LowAccidentalInternal systemsPhishing mistake
Supply ChainHighEspionage/MoneyIndirectCompromised updates

How This Relates to Threat Intelligence and Threat Hunting

Threat Intelligence

Security teams collect information about:

  • Which threat actors are active
  • Their tactics, techniques, and procedures (TTPs)
  • Indicators of compromise (IOCs)

For example:

  • If intelligence reports say an organized crime group is targeting healthcare with ransomware, analysts monitor for related malware signatures.

Threat Hunting

Threat hunting is proactively searching inside networks for hidden attackers.

Example:

  • If threat intelligence reports that an APT uses specific PowerShell commands for lateral movement, a threat hunter searches logs for those behaviors.

Understanding the type of threat actor helps analysts:

  • Predict behavior
  • Prioritize alerts
  • Choose defensive strategies

Important Exam Concepts to Remember

For CySA+ CS0-003:

  • APT = Long-term, stealthy, advanced
  • Nation-state = Government-backed
  • Organized crime = Financial motive
  • Hacktivist = Ideology-driven
  • Script kiddie = Low skill, uses tools
  • Insider threat = Internal user
  • Supply chain = Third-party compromise
  • Intentional vs Unintentional insider is very important
  • Motivation often helps identify the actor
  • Skill level affects attack sophistication
  • Insider threats are often harder to detect

Final Summary

Threat actors are the source of cyberattacks. Each type has:

  • Different motivations
  • Different skill levels
  • Different attack methods
  • Different impact levels

As a cybersecurity analyst, you must:

  • Identify the likely threat actor
  • Understand their behavior
  • Use threat intelligence to prepare
  • Use threat hunting to detect hidden attackers

For the exam, focus strongly on:

  • Motivation differences
  • Skill differences
  • Insider threat categories
  • Supply chain attacks
  • The difference between APT and nation-state

Mastering these concepts will help you correctly analyze scenario-based questions in the CySA+ CS0-003 exam.

Buy Me a Coffee