Threat Actor Reference

This is a reference of typical threat actors you may consider while threat modeling. Links are included to famous cases involving similar threat actors.


Evil Maid

An attacker with physical access to the system in question. This term is mentioned in a blog post by Joanna Rutkowski. Usually describes secnarios where a threat actor targets a device they do not own, but can sometimes be used to describe attacks against your own devices (IE, bypassing DMCA).

Guy with gun

An attacker using physical intimidation to force a target into granting access to a system or to divulge a secret. Can also be used to describe scenarios where national laws allows the use of force to achieve the same ends.

APT Group

Advanced Persistent Threat groups operate consistently over large periods of time. APT groups are often described as sophisticated. Sophistication may describe advantages available to the APT group that differentiate them others.

These advantages may include long-developed intelligence of their victims, development of their own attack tooling, or infrastructure to quickly ramp up and focus on new targets.

APT groups may operate without consequence, receive state intelligence against their targets, or may not necessarily need to focus exclusively on monetary goals.

OG Hacker

Persistent adversaries who are willing to go to great lengths in obtaining vanity usernames or accounts.

Cryptocurrency Miners

Adversary that is interested in compute and hoping to execute mining software on your dime.

Spammers

Adversaries who have found a way to drive victim attention towards a monetization scheme.

Fraudsters

Adversaries with significant access to stolen PII and payment instruments.

Money Launderer

Adversary that is looking to move money around until they can eventually make it liquid.

Confidence Fraud

Adversaries that use intricate social engineering ploys in hopes of extracting funds from a target.

Pig Butchers

Nearly identical to confidence fraud, with a very sad and notable exception that unwilling adversaries may be targeting victims.

Proximity Based RF Hackers

Hacktivist

An adversary with intent to target something they don’t agree with.

Database Trader

Someone who desires your user database to participate in database trading communities.

Cellular Hijacker

An adversary who will use one of many methods towards a goal of intercepting a targets SMS messages and phone calls.

State Sponsored MItM

A state sanctioned attacker against backend internet infrastructure.

Certificate Thief

HelpDesk Social Engineer

An adversary that works primarily through help desk or support channels.

Insider - Malicious

Insider - Accidental

Compromised Employee

Compromised Server

Compromised Service

Bounty Hunter

Tempest / RF

Cable Cutter

Extortion

Cryptocurrency Thief