Cybersecurity Threat Landscape: Actors, Vectors, and Defenses

Posted by Anonymous and classified in Computers

Written on in English with a size of 9.76 KB

🔎 Threat Actors & Their Attack Paths

Who is attacking?

Threat Actors are the people or groups launching attacks. Mnemonic: “NO HIS” (Nation-State, Organized Crime, Hacktivists, Insiders, Script Kiddies).

Actor TypeMotivationTactics
Nation-State (APT Groups)Espionage, warfareAdvanced, persistent attacks
Organized CrimeFinancial gainRansomware, phishing
HacktivistsSocial justice, ideologyWebsite defacement, data leaks
InsidersRevenge, profitData theft, sabotage
Script KiddiesFun, fameLow-skill attacks using existing tools

How do threats reach systems?

Threat Vectors are the attack paths used by threat actors. Mnemonic: “MFWDVN” (Messages, Files, Websites, Devices, Vendors, Networks).

Attack PathExampleHow It Works
Message-BasedPhishing, smishingTrick users into clicking malicious links
File-BasedMalware in PDFs/docsHidden scripts inside attachments
Web-BasedDrive-by downloadsMalicious site infects visitors
Removable MediaInfected USB drivesAuto-run malware from a device
Supply ChainCompromised software updatesAttacker embeds malware in legitimate vendor updates
Network-BasedMITM, sniffingAttackers intercept network traffic

💡 Connections:

  • Threat actors use threat vectors to reach vulnerable systems and launch attacks.
  • Example: An organized crime group uses a phishing vector to spread ransomware.

⚠ Vulnerabilities & Exploits

A Vulnerability is a weakness in a system that attackers exploit. Mnemonic: “AOHVCZ” (Application, OS, Hardware, Virtualization, Configuration, Zero-Day).

Vulnerability TypeExamplesWhy It’s Dangerous
ApplicationSQL Injection, XSSExploits flaws in web apps
OSUnpatched softwareAllows privilege escalation
HardwareDefault passwordsDevices can be hijacked
Virtualization/CloudVM escapeBreaks out of virtual machines
ConfigurationWeak firewall rulesOpens attack paths
Zero-DayNo patch available yetCannot be prevented until discovered

💡 Connections:

  • Vulnerabilities create attack surfaces that threat actors exploit via threat vectors.
  • Example: An insider may exploit weak firewall rules to steal company data.

🔍 Recognizing Attacks (Indicators of Compromise)

Mnemonic: “OCHUBS” (Outbound traffic, CPU usage, Hidden processes, Unauthorized changes, Broken security).

IOC (Indicator of Compromise)What It Suggests
Unusual outbound trafficData exfiltration, command & control malware
High CPU/memory usageCrypto mining malware
Unknown processes/servicesHidden malware persistence
Strange account behaviorCompromised credentials
Unauthorized file changesInsider activity, rootkits
Disabled security toolsMalware tampering with defenses

💡 Connections:

  • Attack techniques create malicious activity, which triggers IOCs.
  • Example: A ransomware attack creates file encryption changes & high CPU usage.

🦠 Malware Types

Mnemonic: “VWTRSKL” (Virus, Worm, Trojan, Ransomware, Spyware, Keylogger, Logic Bomb).

Malware TypeHow It WorksHow to Spot It
VirusAttaches to files, spreads manuallyInfected file behavior
WormSpreads automatically via networksMultiple system infections
Trojan HorsePretends to be legitimate softwareUnexpected program behavior
RansomwareEncrypts files, demands moneyLocked/encrypted files
RootkitHides deep in the systemStealthy, disables security tools
SpywareSteals user dataSecret tracking of activity
KeyloggerRecords keystrokesStolen login credentials
Logic BombActivates under specific conditionsDelayed attack execution

💡 Connections:

  • Attackers use malware to exploit vulnerabilities.
  • Example: A trojan disguised as an email attachment delivers ransomware.

⚡ Common Attack Techniques

Mnemonic: “DDA-PBP” (DDoS, DNS Poisoning, ARP Poisoning, Password Attacks, Buffer Overflow, Race Condition).

AttackHow It WorksExample
DDoSOverloads network with trafficBotnets flood a website
DNS PoisoningRedirects users to fake sitesAttacker modifies DNS records
ARP PoisoningHijacks network trafficMITM attack altering MAC addresses
Password AttacksGuessing credentialsBrute force, dictionary attacks
Buffer OverflowOverwrites memoryCrashes programs, remote code execution
Race Condition (TOC/TOU)Exploits timing gapsSwaps files before execution

💡 Connections:

  • Attackers use password attacks to gain access, then pivot using MITM techniques.
  • Example: An insider uses password spraying, then ARP poisons the network to steal credentials.

🛡️ Mitigation Techniques

Mnemonic: “NAPIES MLC” (Network Segmentation, ACLs, Patch Management, Allowlisting, Isolation/Sandboxing, Encryption, SIEM/Monitoring, Least Privilege, Configuration Management).

MitigationHow It WorksDefends Against
Network SegmentationDivides networks into zonesLimits malware spread
ACLs (Access Control Lists)Restricts access by IP, port, protocolBlocks unauthorized traffic
Patch ManagementRegular OS & app updatesPrevents known exploits
Application AllowlistingOnly approved apps can runStops unauthorized software execution
Isolation & SandboxingRuns suspicious files in a controlled spacePrevents malware infections
EncryptionProtects data at rest & in transitPrevents theft via exfiltration
SIEM & MonitoringLogs & detects anomaliesIdentifies attacks early
Least Privilege EnforcementRestricts user permissionsPrevents insider threats
Configuration ManagementSecures default settingsEliminates weak setups

💡 Connections:

  • Network segmentation prevents malware spread, while monitoring detects attacks early.
  • Example: SIEM detects failed login attempts, then ACLs block unauthorized IPs.

Related entries: