Cyber Threat Intelligence

  1. Threat Actors and Attribution
    1. Threat Actor Categories
      1. Nation-States
        1. Advanced Persistent Threats
          1. State-Sponsored Operations
            1. Geopolitical Objectives
            2. Cybercriminals
              1. Financially Motivated Attacks
                1. Ransomware Groups
                2. Hacktivists
                  1. Ideologically Motivated Attacks
                    1. Publicity-Seeking Campaigns
                    2. Insider Threats
                      1. Malicious Insiders
                        1. Unintentional Insiders
                        2. Script Kiddies
                          1. Pre-Made Tool Usage
                            1. Low Sophistication Attacks
                            2. Cyber Terrorists
                              1. Disruption and Fear Tactics
                                1. Critical Infrastructure Targeting
                              2. Threat Actor Motivations
                                1. Financial Gain
                                  1. Espionage
                                    1. Political Espionage
                                      1. Economic Espionage
                                        1. Military Espionage
                                        2. Ideological Goals
                                          1. Notoriety or Revenge
                                            1. Competitive Advantage
                                            2. Attribution Challenges
                                              1. Technical Attribution
                                                1. Digital Forensics
                                                  1. Infrastructure Tracing
                                                  2. Political Attribution
                                                    1. Diplomatic Considerations
                                                      1. Public Attribution Statements
                                                      2. False Flags and Misdirection
                                                        1. Attribution Deception Techniques
                                                        2. Confidence Levels in Attribution
                                                          1. Evidence Grading
                                                            1. Uncertainty Reporting
                                                            2. Attribution Pitfalls and Limitations