GLOSSARY
Guide to Understanding Cyber Threat Actors
Threat actors who execute cyberattacks, such as ransomware, can wreak havoc on organizations across the private and public sectors. These cyberattacks put their reputation, assets, stakeholders, and customers at stake

What do Cyber Threat Actors Want?
Threat actors who execute cyberattacks, such as ransomware, can wreak havoc on organizations across the private and public sectors. These cyberattacks put their reputation, assets, stakeholders, and customers at stake. Two major yearly studies say it all:
- According to Verizon’s Data Breach Investigations Report (DBIR), encompassing nearly 4,000 breaches last year, 86% of breaches were financially motivated.
- Threat actors cost companies an average of $4.24M per incident, according to the IBM and Ponemon Institute’s 2021 Cost of Data Breach Report. This survey included more than 500 breaches. (This represents the highest number ever recorded in the report’s 17-year history.)
In this article we focus specifically on the behaviors of cyber threat actors. These types of threat actors interact online and are commonly motivated by financial gain.
What You Need to Know about Threat Actors
The behaviors of cyber threat actors are always changing. Their targets, methods, and even their motivations evolve with every passing minute. These motivations are usually, but not always, financially motivated.
Security and fraud teams at government and law enforcement agencies, as well as enterprises, must possess finished, actionable intelligence. This intelligence will help them proactively engage in meaningful cyber threat hunting. It ultimately prevents attacks which could result in the disclosure of data to an unauthorized party.
This begins with a deep understanding of the threat actor landscape. In this article we:
- Define threat actors, including the overlap between a threat actor and a cyber threat actor
- Describe common threat actor motivations—financial and ideological.
- Detail the illicit communities where threat actors commonly operate.
- Outline common methods of attack, including phishing, malware, and ransomware, and desired intent of each (tip: it’s not always malicious).
What is a Cyber Threat Actor?
Cyber threat actors, or simply threat actors, are groups of individuals. They locate and attack technological vulnerabilities. They do this via information systems, networks, domains, devices, and other potentially breachable windows. They then use stolen data to accomplish a variety of goals. These goals are most commonly financial gain.
Cyber threat actors use a variety of tactics to achieve their aims. This includes ransomware attacks, phishing scams, credential stuffing, and DDoS attacks. We describe all of these below.
A group of threat actors is commonly referred to as a “collective.”
Threat Actor vs. Cyber Threat Actor
“Threat actor” is an all-encompassing term for individuals, or groups of individuals. They are motivated by a cause. They take illicit and often illegal actions to realize them.
They are typically split into two categories. One category consists of those whose methods manifest physically (physical security). The other consists of those which manifest as cyberattacks (cybersecurity). Threat actors who intend physical harm, such as violent non-state actors (VSNA), may communicate digitally. They may use the Telegram messaging app, for example. Therefore, they possess a certain cyber element to their methods.
Where Cyber Threat Actors Operate
Threat actors operate in a number of illicit communities. This depends on their objectives.
For example, a number of established forums are dedicated to credit card fraud. This is one of the earliest forms of cybercrime. This includes forums that discuss carding. This ranges from stealing both online and in-store card data to monetizing it. Additionally, there are a number of cybercrime shops that facilitate the sale of compromised card credentials.
Cyber threat activity is associated with the “deep and dark web.” However, chat applications are also common sources of fraudulent activity. Telegram, Discord, messaging boards like 4chan, and frequently used social media platforms are all used by cyber threat actors.
Within these platforms, threat actors operate on established forums and communities. These communities are dedicated to cybercrime subcategories. This includes subcategories such as malware, social engineering, and access providing. Flashpoint has also observed cybercriminals create new communities tailored to ransomware, after traditional forums prohibited the topic.
Types of Threat Actors and their Motivations
It isn’t always easy to isolate a threat actor and figure out their individual motivations. Multiple threat actors can join a single group and unite behind a cause. They may then split when their interests diverge. The fact that a threat actor or group can have multiple motivations further complicates this picture.
For example, a ransomware collective can be financially motivated. They extort ransoms from organizations. However, they may only target entities in certain countries based on their political or social motivations. Most threat actors are motivated by money, but they may also exhibit other motivations, such as causing chaos.
Financially-motivated Threat Actors
Profit is one of the most frequent motivations of cybercriminals at any level of sophistication. Financially-motivated threat actors are opportunistic. They target low-hanging fruit. These threat actors aren’t concerned with the discoverability of their attacks. They are only interested in selling stolen assets quickly.
Cybercriminals
“Cybercriminal” is a blanket term used to describe an individual who conducts illegal activities online. Cybercriminals are also often referred to as “threat actors” or “cyber threat actors.” The label “cybercriminal” is subjective, as every country has different laws governing online activity.
Organized crime: Ransomware
Ransomware is a type of cyber attack. Threat actors encrypt a victim’s files. They then demand a monetary ransom for the decryption key. Recently, the term “ransomware actors” has also been associated with groups participating in data extortion. This involves taking data out and threatening to publish or sell sensitive corporate or personal documents. They may do this in addition to, or instead of, encrypting them. Ransomware actors can operate individually or in specialized groups under the Ransomware-as-a-Service (RaaS) model.
Each threat actor specializes in various aspects of an attack. This includes initial access, encryption, and more. They perform their function. Any paid ransom is split between the group’s members. Since the May 2021 ban of ransomware activity on forums, operators began advertising on the closed-membership forum RAMP. Analysts have also observed advertisements on encrypted messengers like Jabber.
Insider Threats
Insider threats, or insider cyber threats, can be done intentionally—or not. They make up about 30% of all data breaches. Intentional insider threats involve actions taken to harm an organization for personal benefit or to act on a personal grievance.
The intentional insider is often referred to as a “malicious insider.” However, not all insider threats are intentional. A cyber threat actor who is incompetent or negligent puts an organization at risk through carelessness. Negligent insiders are generally familiar with security policies and IT best practices. But they choose to ignore them.
This creates risk for the organization. Out of convenience or incompetence, these unintentional insider threats actively try to bypass security controls. They leave vulnerable data and resources unsecured, against security policies. This gives attackers easy access. Organizations can take proactive steps to mitigate employee mistakes. They can follow best practices to protect themselves from insider threats.
Carders
A carder is an individual who is involved in credit card theft and subsequent fraudulent activities associated with the stolen credit cards. Generally, carding doesn’t require as much technical knowledge as other cybercrime activities, and it is often seen as the stepping stone for many cybercriminals.
Scammers
Scammers are typically involved with various types of fraud. This may include tactics to steal personally identifiable information, or payment card details. Other scams may include perpetrating synthetic identity fraud to borrow lines of credit, or more recently observed COVID-19 scams, like CARES Act Paycheck Protection Program (PPP) or Small Business Association (SBA) loan fraud.
Ideologically motivated threat actors
FUD: Fear, uncertainty, and doubt
FUD-motivated threat actors are motivated by certain political ideologies. They spread false or misleading information in a targeted manner. They also seek to influence public perception of their capabilities or goals. This confuses law enforcement or other adversaries.
Examples include a ransomware collective sharing a message to call rivals to arms against the United States, in order to achieve media exposure. Another is a threat actor sharing publicly available voter information on an illicit forum in order to create the appearance of election meddling.
Advanced Persistent Threat Groups
Advanced Persistent Threat (APT) groups are threat actors or collectives that are typically supported by a nation state either directly (e.g. units of an intelligence agency) or indirectly (e.g. a syndicate supported by the state through shell companies or similar entities)—and who are thus capable of using advanced capabilities in a sustained manner to attack large entities to achieve specific goals.
APTs are usually politically or economically motivated, often use spear phishing or social engineering as initial attack vectors, and apart from doing harm to a target by disrupting operations or stealing funds, will often also have espionage capabilities. Their targets include state institutions, critical infrastructure and large companies possessing key assets. APTs are typically referred to with a number and various researchers and vendors may attach other aliases to them.
Recent examples include the SolarWinds cyberattack (also a supply chain attack) and ransomware-driven cryptocurrency schemes being run out of North Korea.
Hacktivists, Hacktivism
Hacktivists are individuals, or groups such as the decentralized group Anonymous, that act as socially or politically active threat actors. They pose a medium-level threat of carrying out an isolated but damaging attack. Most hacktivist groups attempt to draw public attention to what they believe is an important issue or cause using propaganda, rather than by causing damage to critical infrastructures.
Their goal is to support their own political or social agenda. Their sub-goals are propaganda and causing reputational damage—such as the recent BlueLeaks hack or Epik leak—to achieve notoriety for their cause to inspire social or political change.
Insider Threats
Insider threats that are intentional involve actions taken to harm an organization for personal benefit or to act on a personal grievance. The intentional insider is often synonymously referenced as a “malicious insider” or “malicious actor.” Their motivation is personal gain or harming an organization.
However, not all insider threats are intentional. A threat actor that is incompetent, negligent, or inadvertent puts an organization at risk through carelessness. Negligent insiders are generally familiar with security policies and IT best practices, but choose to ignore them, creating risk for the organization. Out of convenience or incompetence, these unintentional insider threats actively try to bypass security controls. Against security policies, they leave vulnerable data and resources unsecured, giving attackers easy access
Therefore, organizations should take proactive action to mitigate employee mistakes and follow best practices to protect themselves from insider threats.
Script Kiddies (skiddies)
“Script kiddies,” also known as “skiddies,” are threat actors with little experience—newcomers to illicit online communities—who generally engage in areas of cybercrime with a low barrier to entry. The term is used pejoratively to describe actors who, for example, may not understand how a programming language works but are able to download and use scripts written by others.
For example, there are many publicly available tools which can be used for credential stuffing that do not require any real knowledge of penetration testing or programming; therefore, script kiddies have a propensity to engage in this activity.
Cyber Threat Actor Tactics, Techniques, and Procedures (TTPs)
DDoS
A distributed denial of service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service, or network. It does this by flooding it with internet traffic. DDoS attacks are most effective when utilizing multiple compromised computer systems as sources of attack traffic. DDoS attacks are often used to enable a cyber threat actor to steal data from the victim.
Malware
Malware refers to software that is purposefully designed in order to cause damage to a computer or other network resource. There are a variety of malware attack types. This includes trojans, worms, stealers, rootkits, cryptojacking, keyloggers, and ransomware. All of these allow a cyber threat actor to gain access to specific network resources and steal data.
Ransomware
Ransomware is a type of malware. Threat actors use encryption in order to lock up a victim’s data. They then hold it ransom. Extortionist ransomware refers to the practice of publishing, or threatening to publish, stolen data from an infected server. This is done to pressure the victim to pay the ransom. This type of ransomware means that backing up data no longer reduces the threat of ransomware attacks.
Cloud
Cloud resources have common vulnerabilities and misconfigurations. Threat actors often use these before or soon after they have been disclosed. From there, a cyber threat actor can pivot their access to take data out. This data can later be resold in illicit marketplaces. They can also attempt to move laterally through the cloud environment.
Third-party
Threat actors will target third-party software or technology solutions providers. This is done in order to infect a larger number of downstream customers. Managed service providers, cloud service providers, and other IT services providers are integrated into corporate environments. They possibly interact with organizational data.
Social engineering
Threat actors often use social engineering methods. This serves as initial entry points to a certain network or resource. This type of attack takes advantage of the human element within any cyber environment. Phishing is a popular form of social engineering. It involves sending correspondence, such as a phishing email, from a seemingly reputable source. This is done to manipulate a human element and gain access to a cyber environment.
Brute forcing and Credential Stuffing
Brute forcing is the act of programmatically guessing all possible combinations of a potential piece of data, such as a password.
Credential stuffing is the act of using a previously obtained list of passwords to try to gain access to a victim’s account. These two attacks are closely related. Threat actors commonly use the term “brute forcing” or “brute” to refer to them both.
For example, a threat actor who wants to gain access to streaming accounts might buy a list of usernames and password hashes. These hashes were obtained from a compromised dating site. They will then attempt to “crack” those password hashes by brute forcing them. This involves guessing and hashing all possible combinations of letters in order to determine what plaintext passwords those hashes represent.
Finally, as an example of credential stuffing, the threat actor will take that list of usernames and plaintext passwords from the dating site. They will try all username:password pairs on the streaming site. The hope is that some users signed up for both services using the same username/password combination. There are many variations on this kind of attack. For example, “reverse brute forcing” tries one common password with a list of many usernames. Some attacks use “brute forcing tools” in order to test username:password combinations on multiple sites at the same time. However, ultimately, these attacks all have unauthorized access to victim accounts as their goal.
Prepare for Ransomware and Cyber Extortion with Flashpoint
Keep track of IOCs associated with groups known to target your industry on the Flashpoint platform. Request a demo and see firsthand how Flashpoint cybersecurity technology can help your organization access critical information and insights into ransomware actors and their tactics, techniques, and procedures (TTPs).
Frequently Asked Questions (FAQ)
Q. What is the primary motivation for most cyber threat actors?
A. The vast majority of cyber threat actors are financially motivated (according to industry reports, over 85% of breaches are financial). They seek profit by stealing and selling data, extorting ransoms, or committing fraud.
Q. Where do threat actors commonly operate and communicate?
A. Threat actors operate across illicit online communities. This includes specialized deep and dark web forums, encrypted messaging apps like Telegram, and even frequently used public social media platforms where they discuss tactics, recruit, and sell stolen assets.
Q. How does Flashpoint help me understand and track threat actors?
A. Flashpoint provides finished, actionable intelligence on threat actor Tactics, Techniques, and Procedures (TTPs), motivations, and the communities they use. This deep understanding enables security teams to proactively engage in cyber threat hunting and prevent attacks before they result in data loss.
Get the latest news and insights delivered to your inbox.
Interested to see top news from Flashpoint hit your inbox directly? Subscribe to our newsletter to receive curated content on a regular basis.