What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

A threat actor, also called a malicious actor or bad actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security. 

In threat intelligence, actors are generally categorized as external, internal or partner.  With external threat actors, no trust or privilege previously exists, while with internal or partner actors, some level of trust or privilege has previously existed. The actor may be an individual or an organization; the incident could be intentional or accidental and its purpose malicious or benign. 

External actors are the primary concern of threat intelligence services not only because they are the most common, but also because they tend to be the most severe in terms of negative impact. Such threat actors are sometimes categorized as either being commodity or advanced. A commodity threat actor launches a broad-based attack hoping to hit as many targets as possible, while an advanced threat actor targets an organization, often seeking to implement an advanced persistent threat [APT] in order to gain network access and remain undetected for a long time, stealing data at will.

Another type of external threat actor is the hacktivist. Hacktivist groups such as Anonymous use many of the same tools employed by financially-motivated cybercriminals to detect website vulnerabilities and gain unauthorized access or carry out distributed denial-of-service [DDoS] attacks. The motivation of most hacktivists is to gain access to sensitive information that will negatively impact the reputation of an individual, a brand, a company or a government.

Learn more about commodity vs. advanced threat actors:

This was last updated in January 2016

Continue Reading About threat actor

  • An introduction to threat intelligence services in the enterprise
  • Understanding advanced persistent threat actors

Related Terms

buffer underflowA buffer underflow, also known as a buffer underrun or a buffer underwrite, is when the buffer -- the temporary holding space ... See complete definitionTrojan horseIn computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ... See complete definitionWi-Fi Protected Access [WPA]Wi-Fi Protected Access [WPA] is a security standard for computing devices equipped with wireless internet connections. See complete definition

Word of the Day

neuromorphic computing

Neuromorphic computing is a method of computer engineering in which elements of a computer are modeled after systems in the human brain and nervous system.

Let’s look at the common definitions for each of our personas that target our businesses, governments, and even our personal technology.

  • Threat Actor: According to Tech Target, “a threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for a security incident that impacts – or has the potential to impact – an organization's security.”
  • Hacker: According to TechTerms.com, “While this term originally referred to a clever or expert programmer, it is now more commonly used to refer to someone who can gain unauthorized access to other computers. A hacker can "hack" his or her way through the security levels of a computer system or network. This can be as simple as figuring out somebody else's password or as complex as writing a custom program to break another computer's security software.”
  • Attacker: According to Wikipedia, “A cyberattack is any offensive maneuver that targets computer information systems, computer networks, infrastructures, or personal computer devices. An attacker is a person or process that attempts to access data, functions, or other restricted areas of the system without authorization, potentially with malicious intent. ” Thus, an attacker is the individual or organization performing these malicious activities, regardless of the method deployed.

Why is there a Distinction Between Threat Actor, Hacker, and Attacker?

A threat actor – compared to a hacker or attacker – does not necessarily have any technical skill sets. They are a person or organization with malicious intent and a mission to compromise an organization’s security or data. This could be anything from physical destruction to simply copying sensitive information. It is a broad term and is intentionally used because it can apply to external and insider threats, including missions like hacktivism.

Hackers and attackers are technical personas or organizations intentionally targeting technology to create an incident and, hopefully [for them, not you], a breach. They can be solo individuals, groups, or even nation-states with goals and missions to destabilize a business, government, to disseminate information, or for financial gain.

The difference between an attacker and hacker is subtle, however. Hackers traditionally use vulnerabilities and exploits to conduct their activities and have the technical skills to create or deploy malware used during their nefarious activities. Attackers can use any means to cause havoc. For example, an attacker may be a disgruntled insider who deletes sensitive files or disrupts the business by any means to achieve their goals. They could simply unplug a key system. A hacker might seek to perform the same goal, but they use vulnerabilities, misconfigurations, and exploits to compromise a resource outside of their acceptable roles and privileges using technology and malware as their primary tools.

Does the Difference Matter?

Yes! Understanding the differences between threat actor, hacker, and attacker is important.

BeyondTrust solutions are designed to protect against all three types of malicious users:

  • Threat Actors: BeyondTrust’s password management solutions manage all privileged identities, log all activity in the form of session recordings or keystroke logging, and monitor applications to ensure threat actors do not gain inappropriate access. In addition, BeyondTrust solutions manage and document all privileged sessions just in case threat actors [such as insider threats], do infiltrate the enterprise, enabling the ability to pause or terminate sessions, and providing an unimpeachable audit trail for forensics and compliance.
  • Hackers: BeyondTrust’s Endpoint Privileged Management solutions are designed to remove administrative privileges from applications and users. The solution ensures hackers cannot inappropriately elevate privileges, or launch child processes that could contain malware, during a session. This closes the gaps a hacker can use to compromise your environment since almost success breaches need privileges during some part of the cyberattack chain.
  • Attackers: BeyondTrust’s Secure Remote Access solutions are designed to secure all major remote access protocols that could be targeted by attackers. With all sessions being brokered, audited, and secured from native protocol tampering, organizations can mitigate the risks of an attacker using a legitimate remote access session to perform unauthorized activities.

The next time you see an article on a breach or incident, think about the offending persona and how they conducted their nefarious activity.


BeyondTrust can help defend against all three personas. For more information, including a personalized demo, contact us today.

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers?

b. Brokers sell their knowledge of a security weakness to other attackers or governments.

What are the 5 categories of cyber threat actors?

Figure 1: Cyber threat actors.
Nation state cyber threat actors are often geopolitically motivated..
Cybercriminals are often financially motivated..
Hacktivists are often ideologically motivated..
Terrorist groups are often motivated by ideological violence..
Thrill-seekers are often motivated by satisfaction..

Which category of cybersecurity vulnerability is exploited by attackers before anyone else knows about it a Patches B platforms C Zero Day d third parties?

A zero-day exploit is when hackers take advantage of a software security flaw to perform a cyberattack. And that security flaw is only known to hackers, meaning software developers have no clue to its existence and have no patch to fix it.

Which of the following are considered threat actors?

Types of Threat Actors.
Government-Sponsored/State-Sponsored Actors. These threat actors are funded, directed, or sponsored by nations. ... .
Organized Crime/Cybercriminals. Crime is everywhere, and the internet is no different. ... .
Hacktivists. ... .
Insiders. ... .
Script Kiddies. ... .
Internal User Errors..

Chủ Đề