OBJECTIVE 2.1 Compare and contrast

Compare and contrast common threat actors and motivations

Understanding who’s attacking you determines how you defend. A script kiddie and a nation-state APTAdvanced Persistent Threat — Sophisticated, long-term targeted attack (usually nation-state) require fundamentally different defensive postures. The exam expects you to profile threat actors by their attributes and predict behavior based on motivation.

Threat Actor Types

Nation-State

Government-sponsored or government-affiliated actors conducting cyber operations.

  • Resources: Virtually unlimited budget, custom zero-day exploits, dedicated teams
  • Sophistication: Highest. Custom malware, supply chain attacks, long-term persistent access
  • Motivation: Espionage (intelligence gathering), disruption (critical infrastructure), political influence
  • Timeframe: Months to years of persistent access (APTAdvanced Persistent Threat — Sophisticated, long-term targeted attack (usually nation-state) = Advanced Persistent Threat)
  • Examples: Stuxnet (US/Israel → Iran nuclear program), SolarWinds (Russia → US government agencies), Pegasus (NSO Group, used by multiple states)

Unskilled Attacker (Script Kiddie)

Low-skill individual using pre-built tools and scripts without understanding the underlying mechanics.

  • Resources: Minimal. Uses freely available tools (Metasploit, downloaded exploit kits)
  • Sophistication: Low. Follows tutorials, can’t adapt when tools fail
  • Motivation: Curiosity, bragging rights, minor disruption
  • Danger: Don’t underestimate volume. Automated scanning means even unskilled attackers find unpatched systems. They don’t need to be sophisticated if your defenses are weak.

Hacktivist

Ideologically motivated attacker targeting organizations that conflict with their beliefs.

  • Resources: Low to moderate. Often organized loosely (Anonymous-style)
  • Sophistication: Varies widely. DDoSDistributed Denial of Service — Attack overwhelming target from multiple sources and website defacement are common; some groups execute sophisticated breaches
  • Motivation: Political/social change, embarrassment of target, data leaks for public exposure
  • Tactics: DDoSDistributed Denial of Service — Attack overwhelming target from multiple sources, defacement, doxxing, data dumps

Insider Threat

Someone with legitimate access who misuses it — deliberately or accidentally.

  • Intentional: Disgruntled employee, corporate espionage, sabotage
  • Unintentional: Employee who clicks a phishing link, misconfigures a system, or loses a device
  • Why it’s dangerous: Already past your perimeter controls. Has legitimate credentials. Knows where the valuable data is.
  • Detection: User behavior analytics (UBA), DLPData Loss Prevention — Prevents unauthorized data exfiltration, privileged access monitoring, separation of duties

Organized Crime

Criminal groups treating cybercrime as a business operation.

  • Resources: Significant. Reinvest profits into better tools and talent
  • Sophistication: Moderate to high. Ransomware-as-a-Service (RaaS), bulletproof hosting, money laundering infrastructure
  • Motivation: Financial gain — ransomware, data theft for sale, credit card fraud, business email compromise (BECBusiness Email Compromise — Impersonating executives to authorize fraudulent transfers)
  • Business model: Some groups offer customer support, SLAs on decryption keys, and affiliate programs

Shadow IT

Not a traditional threat actor, but employees or departments deploying unauthorized technology.

  • Unapproved SaaSSoftware as a Service — Cloud: provider manages everything, you configure apps, personal cloud storage, rogue wireless access points
  • Creates unmonitored attack surface outside security team’s visibility
  • Exam context: Organizational risk, not malicious intent — but the security impact is real

Competitor

Business rivals engaging in corporate espionage or competitive disruption.

  • Motivation: Trade secrets, customer data, strategic advantage
  • Methods: May hire third parties, exploit insiders, or conduct targeted social engineering
  • Less common on the exam but worth knowing

Threat Actor Attributes

The exam asks you to compare actors across these dimensions:

AttributeLowHigh
Resources/FundingScript kiddie, hacktivistNation-state, organized crime
SophisticationScript kiddieNation-state APTAdvanced Persistent Threat — Sophisticated, long-term targeted attack (usually nation-state)
CapabilityUnskilled (uses existing tools)Custom zero-days, supply chain
IntentUnintentional insiderNation-state espionage

Internal vs. External

  • Internal: Insiders, shadow ITInformation Technology — Broad term for computing infrastructure and services. Already have legitimate access.
  • External: Nation-states, hacktivists, organized crime, script kiddies. Must breach the perimeter first.

Level of Sophistication/Capability

  • Low: Pre-built tools, known exploits, no ability to adapt
  • Moderate: Can customize tools, chain exploits, conduct targeted phishing
  • High: Custom malware, zero-day exploits, supply chain compromise, operational security to avoid detection

Motivations

MotivationTypical ActorsExample
Data exfiltrationNation-state, organized crime, competitorStealing trade secrets, PIIPersonally Identifiable Information — Data that can identify an individual for sale
Financial gainOrganized crimeRansomware, BECBusiness Email Compromise — Impersonating executives to authorize fraudulent transfers, credit card fraud
Disruption/chaosHacktivist, nation-stateDDoSDistributed Denial of Service — Attack overwhelming target from multiple sources on critical infrastructure
EspionageNation-state, competitorLong-term intelligence gathering
Philosophical/politicalHacktivistWebsite defacement, document leaks
RevengeInsiderSabotage after termination
WarNation-stateCyberattacks as component of military operations
Ethical (authorized)Penetration testersContracted security testing

Attack Vectors by Actor

Different actors prefer different entry points:

  • Nation-state: Supply chain, zero-day exploits, spear-phishing of specific individuals
  • Organized crime: Phishing at scale, exploiting known vulnerabilities, RDPRemote Desktop Protocol — Port 3389. Microsoft remote access brute force
  • Hacktivist: DDoSDistributed Denial of Service — Attack overwhelming target from multiple sources, web application attacks, social engineering
  • Insider: Direct access abuse, data exfiltration via USBUniversal Serial Bus — Standard connector for peripherals or cloud upload

Threat Actor Identification — Scenario Decision Logic

CompTIA describes a scenario and asks you to identify the threat actor. Use these clues:

If the scenario mentions…The actor is likely…
Custom malware, zero-day exploits, months of undetected accessNation-state
Ransomware demand, BECBusiness Email Compromise — Impersonating executives to authorize fraudulent transfers wire transfer, credit card data for saleOrganized crime
Website defacement, data dump with political message, DDoSDistributed Denial of Service — Attack overwhelming target from multiple sources during protestHacktivist
Publicly available exploit tools, no adaptation when blockedUnskilled attacker
Employee downloading customer data to USBUniversal Serial Bus — Standard connector for peripherals before resignationInsider (intentional)
Employee clicking phishing link, misconfiguring firewall ruleInsider (unintentional)
Targeting trade secrets of a specific competitorCompetitor
Unauthorized SaaSSoftware as a Service — Cloud: provider manages everything, you configure app, personal cloud storage with company dataShadow ITInformation Technology — Broad term for computing infrastructure and services
Supply chain compromise affecting thousands of downstream customersNation-state (usually)
RaaS affiliate using purchased tools with moderate skillOrganized crime

Key Differentiators

ClueDistinguishes Between
Sophistication of toolsNation-state (custom) vs. unskilled (off-the-shelf)
Persistence and patienceNation-state (months/years) vs. organized crime (quick profit)
Motivation statedPolitical = hacktivist, financial = organized crime, intelligence = nation-state
Internal access usedInsider (already inside) vs. external (must breach perimeter)
Monetary demandOrganized crime (ransomware, extortion) vs. nation-state (no demand, just steals)

Offensive Context

Profiling works both directions. Just as a defender profiles attackers, an attacker profiles defenders — what’s the org’s security maturity? How fast do they patch? Do they monitor lateral movement? Threat intelligence isn’t just consuming IOCs — it’s understanding adversary tradecraft well enough to predict their next move based on who they are. A nation-state actor who gets detected will retool and come back; a script kiddie will move to an easier target.