0
0
Cybersecurityknowledge~10 mins

Threat actors and motivations in Cybersecurity - Step-by-Step Execution

Choose your learning style9 modes available
Concept Flow - Threat actors and motivations
Identify Target
Threat Actor Chooses Motivation
Plan Attack Based on Motivation
Execute Attack
Achieve Goal or Fail
Repeat or Change Strategy
Threat actors pick a target, choose why they attack, plan and execute, then either succeed or fail, possibly repeating.
Execution Sample
Cybersecurity
Threat Actor: Hacker
Motivation: Financial Gain
Action: Phishing Attack
Result: Steal Money
Shows a hacker motivated by money using phishing to steal funds.
Analysis Table
StepThreat ActorMotivationActionResult
1HackerFinancial GainPhishing Email SentWaiting for Victim
2HackerFinancial GainVictim Clicks LinkCredentials Stolen
3HackerFinancial GainUse CredentialsMoney Transferred
4HackerFinancial GainCover TracksAttack Hidden
5HackerFinancial GainGoal AchievedFunds Stolen
💡 Attack ends after funds are stolen or detected.
State Tracker
VariableStartAfter Step 1After Step 2After Step 3After Step 4Final
Threat ActorNoneHackerHackerHackerHackerHacker
MotivationNoneFinancial GainFinancial GainFinancial GainFinancial GainFinancial Gain
ActionNonePhishing Email SentVictim Clicks LinkUse CredentialsCover TracksGoal Achieved
ResultNoneWaiting for VictimCredentials StolenMoney TransferredAttack HiddenFunds Stolen
Key Insights - 3 Insights
Why does the threat actor choose a specific motivation before acting?
The motivation guides the type of attack planned and the target chosen, as shown in Step 1 and 2 of the execution_table.
What happens if the victim does not click the phishing link?
The attack cannot proceed to steal credentials or money, so the result stays at 'Waiting for Victim' as in Step 1.
Why does the threat actor cover their tracks after stealing money?
To avoid detection and continue attacks or keep stolen funds, shown in Step 4 where 'Cover Tracks' leads to 'Attack Hidden'.
Visual Quiz - 3 Questions
Test your understanding
Look at the execution_table, what is the 'Result' after Step 2?
AMoney Transferred
BWaiting for Victim
CCredentials Stolen
DAttack Hidden
💡 Hint
Check the 'Result' column in row for Step 2.
At which step does the threat actor 'Cover Tracks'?
AStep 4
BStep 5
CStep 3
DStep 2
💡 Hint
Look at the 'Action' column to find when 'Cover Tracks' happens.
If the victim never clicks the phishing link, what would the 'Result' remain as?
ACredentials Stolen
BWaiting for Victim
CFunds Stolen
DAttack Hidden
💡 Hint
Refer to Step 1 where the phishing email is sent but no victim action yet.
Concept Snapshot
Threat actors are people or groups who attack systems.
They have motivations like money, politics, or fun.
They plan attacks based on these reasons.
Actions include phishing, malware, or hacking.
Success depends on victim response and actor skill.
Full Transcript
Threat actors choose targets and motivations before attacking. Motivations guide their actions, such as financial gain leading to phishing attacks. The attack progresses step-by-step: sending phishing emails, victim interaction, stealing credentials, transferring money, and hiding tracks. If victims do not engage, the attack stops early. Covering tracks helps avoid detection. Understanding these steps helps recognize and defend against cyber threats.