Intro To Cyber

Lecture 7

Date Taken: Fall 2025
Status: Completed
Reference: LSU Professor Joseph Khoury, ChatGPT

Threats

Threat Actors

Threat actors are individuals or groups that pose a risk to the security of information systems and data. They can have various motivations, capabilities, and methods of attack. Common types of threat actors include:

Motications of Threat Actor

Threat actors can have various motivations for their actions, which can influence the methods they use and the targets they choose. Common motivations include:

Nations States

Nation-state actors are government-sponsored groups that conduct cyber operations to advance national interests. They often have significant resources, capabilities, and expertise, allowing them to carry out sophisticated attacks against various targets. Highest sophistication and resources. Often part of a country's military or intelligence services. Goals include espionage, disruption, and propaganda.

Unskilled Attackers

Unskilled attackers, often referred to as "script kiddies," are individuals who lack advanced technical skills but use pre-written scripts or tools to launch cyber attacks. They typically seek notoriety or personal satisfaction rather than financial gain or political objectives. They often use tools developed by others to exploit known vulnerabilities. Their attacks can still cause significant damage, especially if they target unpatched systems.

Hacktivists

Hacktivists are individuals or groups who use hacking techniques to promote political or social causes. Their actions may include defacing websites, leaking sensitive information, or disrupting services to draw attention to their cause. They often target organizations or governments they perceive as unjust or corrupt. Their methods can include website defacements, DDoS attacks, and data leaks.

Insiders

Insiders are individuals with authorized access to an organization's systems who may intentionally or unintentionally compromise security. Insider threats can include data theft, sabotage, or accidental data leaks, and they can be particularly challenging to detect and prevent. They can be current or former employees, contractors, or business partners. Insider threats can be malicious (intentional harm) or unintentional (accidental data leaks).

Organized Crime

Organized crime groups are structured criminal organizations that engage in illegal activities for financial gain. In the context of cybersecurity, these groups often conduct cybercrime operations such as ransomware attacks, data breaches, and fraud. They operate with a high level of organization and coordination, often involving multiple individuals with specialized roles. Their activities can include ransomware, phishing, identity theft, and financial fraud.

Shadow IT

Shadow IT refers to the use of information technology systems, software, and services within an organization without the knowledge or approval of the IT department. This can include the use of unauthorized applications, cloud services, or devices that may pose security risks. Common examples include employees using personal cloud storage services, messaging apps, or software tools that are not sanctioned by the organization. Shadow IT can lead to data breaches, compliance violations, and other security issues.

Threat Actor Table

Threat Vector

A threat vector is the path or method used by a threat actor to gain unauthorized access to a system or network. Understanding threat vectors is crucial for developing effective security measures and protecting against potential attacks. Common threat vectors include:

Open Service Ports

Open service ports are network ports that are actively listening for incoming connections and are accessible from external networks. While open ports are necessary for certain services to function, they can also pose security risks if not properly managed and secured. Most network-based services connect over a TCP or UDP port. Common open service ports include:

Default Credentials

Default credentials refer to the pre-configured usernames and passwords that come with hardware devices, software applications, or network equipment. These credentials are often set by the manufacturer and are intended to be changed by the user during the initial setup process. Default credentials pose a significant security risk if they are not changed, as they are widely known and can be easily exploited by attackers to gain unauthorized access to systems and networks. Very easy to find the defaults for your access point or router. https://www.routerpasswords.com is a good resource to find default passwords.

Supply Chain Vectors

Supply chain vectors refer to the various points of vulnerability within the supply chain that can be exploited by threat actors to compromise the security of products, services, or data. These vulnerabilities can arise at any stage of the supply chain, from raw material sourcing to manufacturing, distribution, and delivery. Common supply chain vectors include:

Phishing

Phishing is a cyber attack technique that involves sending fraudulent messages, often via email, that appear to come from a reputable source. The goal of phishing is to trick recipients into revealing sensitive information, such as login credentials, financial information, or personal data, or to download malware onto their devices. Common types of phishing attacks include:

Business Email Compromise

Business Email Compromise (BEC) is a type of cyber attack that targets organizations by compromising legitimate business email accounts. The goal of BEC attacks is to trick employees, customers, or partners into transferring funds, revealing sensitive information, or performing other actions that benefit the attacker. BEC attacks often involve social engineering tactics, such as impersonating a high-level executive or a trusted vendor, to create a sense of urgency and legitimacy.

Tricks and Misdirections

Tricks and misdirections are techniques used by threat actors to deceive individuals and manipulate their behavior in order to achieve malicious objectives. These tactics often involve exploiting human psychology and cognitive biases to create a sense of urgency, trust, or fear. Some tricks are typosquatting - a type of cybersquatting where attackers register domain names that are similar to legitimate ones, often by making slight misspellings or variations, an example - https://Isu.edu. Pretexting - creating a fabricated scenario to engage a target and extract information or perform actions. An example is pretending to be from IT support to gain access to a system.

Impersonation

Impersonation is a technique used by threat actors to deceive individuals by pretending to be someone they are not. The goal of impersonation is to gain trust and manipulate the target into revealing sensitive information, performing actions, or granting access to systems or resources.

Eliciting Information

Eliciting information is a technique used by threat actors to extract sensitive or confidential information from individuals through various means, often by exploiting human psychology and social engineering tactics. The goal of eliciting information is to gather data that can be used for malicious purposes, such as identity theft, fraud, or unauthorized access to systems.

Identity Fraud

Identity fraud is the unauthorized use of another person's personal information, such as their name, social security number, or financial details, to commit fraud or other crimes. Identity fraud can have serious consequences for victims, including financial loss, damage to credit scores, and legal issues.

Protect Against Impersonation

To protect against impersonation attacks, individuals and organizations can implement several strategies:

Watering Hole Attack

A watering hole attack is a cyber attack technique where threat actors compromise a website or online resource that is frequently visited by a specific group of individuals or organizations. The goal of the attack is to infect the targeted users' devices with malware or gain unauthorized access to their systems when they visit the compromised site. The term "watering hole" is derived from the idea of predators waiting at a watering hole to ambush prey, as attackers wait for their targets to visit the compromised site.

Executing the Watering Hole Attack

The execution of a watering hole attack typically involves several steps:

Watering Hole Attack Defense

Some defense measures if defense-in-depth in which you have multiple layers of security so if one layer is compromised you have another layer to fall back on. Firewalls and IPS stops the network traffic before things get worse. Anti-virus/Anti-malware signature updates to help detect known malware. Web content filtering to block access to known malicious sites. Regular patching and updates to fix vulnerabilities in software and systems. User education and awareness training to help users recognize and avoid potential threats.

Misinformation/Disinformation

Misinformation and disinformation are two related but distinct concepts that involve the spread of false or misleading information. Misinformation refers to the unintentional spread of false information, while disinformation refers to the deliberate creation and dissemination of false information with the intent to deceive or manipulate. Both misinformation and disinformation can have significant impacts on individuals, organizations, and society as a whole, particularly in the context of social media and online communication.

Brand Immpersonation

Brand impersonation is a type of cyber attack where threat actors create fake websites, social media profiles, or other online resources that mimic legitimate brands or organizations. The goal of brand impersonation is to deceive individuals into believing they are interacting with the legitimate brand, often to steal sensitive information, distribute malware, or conduct fraud.