RedSheep SecurityRedSheepSecurity
Foundations — Lesson 4 of 10

Threat Landscape Overview

10 min read

The cyber threat landscape encompasses all actors, motivations, capabilities, and methods that pose a risk to organizations and nations. Understanding this landscape is foundational to CTI — you cannot defend against threats you do not understand. This lesson categorizes the major threat actor types, examines their motivations and capabilities, and traces how the landscape has evolved over time.

Learning Objectives

  • Identify and describe the four major categories of cyber threat actors
  • Understand the motivations, capabilities, and targeting patterns of each category
  • Recognize well-known threat groups and their attributed nation-state sponsors
  • Explain how the threat landscape has evolved over the past two decades
  • Apply a motivation-based framework to assess threat relevance to an organization

Threat Actor Categories

Cyber threat actors are typically categorized by their motivation and sponsorship. While individual actors may blur these boundaries, four primary categories are widely recognized in the intelligence community.

Category Primary Motivation Typical Sponsorship Capability Level Persistence
Nation-State / APT Espionage, disruption, influence Government-directed or -affiliated High to very high Long-term (months to years)
Cybercriminal Financial gain Self-funded or organized crime Low to high Variable (opportunistic to persistent)
Hacktivist Ideological, political Self-organized, sometimes loosely state-aligned Low to moderate Campaign-driven (days to weeks)
Insider Threat Financial, ideological, coercion, negligence Internal to the organization Variable (depends on access, not skill) Variable

Nation-State Actors (Advanced Persistent Threats)

Nation-state actors represent the most capable and persistent category of cyber threat. These groups are either directly employed by or operate on behalf of a national government's intelligence, military, or security services. The term Advanced Persistent Threat (APT) was coined by the U.S. Air Force in 2006 to describe this class of adversary.

Key Characteristics

  • Advanced: Possess sophisticated tools, zero-day exploits, and custom malware; capable of developing novel attack techniques
  • Persistent: Maintain long-term access to targets, often operating undetected for months or years
  • Resourced: Backed by government budgets, enabling sustained operations, dedicated infrastructure, and specialized training
  • Targeted: Pursue specific intelligence objectives rather than opportunistic targeting

Notable Nation-State Groups

The following are well-documented threat groups attributed to specific nation-states by multiple independent sources (government advisories, vendor research, legal indictments):

Russia

Group Name Also Known As Attribution Primary Targets Notable Operations
APT28 Fancy Bear, Sofacy, Strontium, Forest Blizzard GRU (Military Intelligence Unit 26165) Government, military, defense, media DNC breach (2016), Bundestag hack (2015), Olympic doping agency attacks
APT29 Cozy Bear, The Dukes, Midnight Blizzard SVR (Foreign Intelligence Service) Government, think tanks, technology SolarWinds supply chain attack (2020), COVID-19 vaccine research targeting
Sandworm Voodoo Bear, Iridium, Seashell Blizzard GRU (Unit 74455) Critical infrastructure, elections Ukraine power grid attacks (2015, 2016), NotPetya (2017), Olympic Destroyer (2018)

China

Group Name Also Known As Attribution Primary Targets Notable Operations
APT41 Double Dragon, Wicked Panda, Barium MSS-affiliated, dual espionage/financial Healthcare, telecom, gaming, technology Supply chain compromises, ShadowPad malware, indicted by DOJ (2020)
APT1 Comment Crew, Comment Panda PLA Unit 61398 Defense, aerospace, energy, technology Documented in Mandiant's 2013 APT1 report — first major public attribution
APT10 Stone Panda, MenuPass MSS (Tianjin Bureau) Managed service providers, aerospace, defense Operation Cloud Hopper — targeting MSPs to access client networks

North Korea

Group Name Also Known As Attribution Primary Targets Notable Operations
Lazarus Group Hidden Cobra, Diamond Sleet RGB (Reconnaissance General Bureau) Financial institutions, cryptocurrency, defense Sony Pictures attack (2014), WannaCry ransomware (2017), Bangladesh Bank heist ($81M, 2016), cryptocurrency theft operations

Iran

Group Name Also Known As Attribution Primary Targets Notable Operations
APT33 Elfin, Refined Kitten, Peach Sandstorm IRGC-affiliated Aerospace, energy (petrochemical), defense Shamoon-related destructive operations targeting Saudi Arabia
APT35 Charming Kitten, Phosphorus, Mint Sandstorm IRGC Intelligence Organization Government, academia, journalists, dissidents Credential harvesting campaigns against researchers, diplomatic personnel

A Note on Attribution: Attribution of cyber operations to specific governments is inherently difficult and carries uncertainty. The attributions listed above are based on convergent evidence from multiple independent sources including government indictments, technical analysis by multiple vendors, and intelligence community assessments. Attribution should always be accompanied by a confidence level.

Cybercriminal Actors

Cybercriminals are motivated primarily by financial gain. This category spans a wide range — from unsophisticated script kiddies to highly organized criminal enterprises that rival nation-state capabilities.

The Ransomware Ecosystem

Ransomware has dominated the cybercriminal landscape since the mid-2010s. The ecosystem has evolved from individual actors to a sophisticated Ransomware-as-a-Service (RaaS) model:

  • RaaS Operators develop and maintain the ransomware platform, negotiation infrastructure, and leak sites
  • Affiliates purchase access and conduct the actual intrusions, deploying the ransomware
  • Initial Access Brokers (IABs) sell access to compromised networks, decoupling the initial intrusion from the ransomware deployment

Notable ransomware groups and operations have included LockBit, BlackCat/ALPHV, Conti, REvil/Sodinokibi, and Cl0p — though the landscape shifts continuously as groups rebrand, are disrupted by law enforcement, or fracture.

Evolution of Cybercriminal Tactics

The cybercriminal landscape has evolved significantly:

Era Tactics Example
Early 2000s Individual fraud, carding, banking trojans Zeus banking trojan
2010s Ransomware (encrypt and demand payment) CryptoLocker (2013), WannaCry (2017)
Late 2010s Double extortion (encrypt + threaten data leak) Maze ransomware (2019) pioneered this model
2020s Triple extortion (encrypt + leak + DDoS/harassment), supply chain targeting, data theft without encryption Cl0p MOVEit exploitation (2023) — data theft only, no encryption

Business Email Compromise (BEC)

While less technically sophisticated than ransomware, BEC remains one of the costliest forms of cybercrime. The FBI's Internet Crime Complaint Center (IC3) has consistently reported BEC losses exceeding those from ransomware. BEC actors use social engineering rather than technical exploitation, making them a distinct threat that CTI teams must track.

Hacktivist Actors

Hacktivists conduct cyber operations to promote political or ideological causes. Their capabilities have historically been limited to defacements, DDoS attacks, and data leaks, but the boundary between hacktivism and state-aligned operations has blurred significantly.

Traditional Hacktivism

Groups like Anonymous (active primarily 2008-2015) exemplified traditional hacktivism — loosely organized collectives conducting DDoS attacks and data breaches against targets they perceived as unjust. Operations were typically short-lived, publicly announced, and designed for maximum media attention.

State-Aligned Hacktivism

A significant development in the threat landscape has been the emergence of hacktivist groups that align with nation-state interests. Following Russia's invasion of Ukraine in 2022, numerous groups emerged on both sides of the conflict conducting DDoS attacks, defacements, and data leaks. Groups like KillNet, NoName057(16), and the IT Army of Ukraine blurred the line between grassroots activism and state-directed operations.

This trend raises important analytical questions for CTI teams: Is a self-described hacktivist group genuinely independent, or is it a front for or proxy of a nation-state? The answer affects threat assessment, expected capability level, and likely persistence.

Insider Threats

Insider threats originate from individuals with legitimate access to an organization's systems and data. They are fundamentally different from external threats because the adversary begins with authorized access, bypassing many perimeter defenses.

Types of Insider Threats

Type Motivation Example
Malicious Insider Financial gain, ideology, revenge, coercion An employee selling proprietary data to a competitor or foreign government
Negligent Insider None (unintentional) An employee clicking a phishing link or misconfiguring a cloud storage bucket
Compromised Insider External actor using stolen credentials An employee whose credentials were phished, with an external actor using their access

Insider threats are particularly challenging for CTI because traditional intelligence sources (threat feeds, dark web monitoring, vendor reports) provide limited visibility. Detecting insider threats requires behavioral analytics, access monitoring, and organizational awareness — areas where CTI teams must collaborate closely with HR, legal, and security operations.

The Motivations Matrix

Understanding adversary motivation helps CTI teams assess which threats are relevant to their organization. Not every threat actor targets every organization.

Motivation Actor Types Typical Targets What They Seek
Espionage Nation-state Government, defense, technology, research Classified information, trade secrets, intellectual property
Financial Gain Cybercriminal, some nation-state (DPRK) All sectors, especially healthcare, finance, manufacturing Direct payment (ransom), data for sale, financial fraud
Disruption/Destruction Nation-state, hacktivist Critical infrastructure, government, media Service disruption, physical damage, psychological impact
Influence Nation-state Elections, media, social platforms Shape public opinion, undermine trust in institutions
Ideological Hacktivist Targets perceived as unjust, corporate, government Media attention, embarrassment, data exposure

An organization's sector, geography, data holdings, and strategic significance determine which motivations — and therefore which threat actors — are most relevant. A defense contractor faces different threats than a hospital, which faces different threats than a cryptocurrency exchange.

Evolution of the Threat Landscape

The cyber threat landscape has transformed dramatically over the past two decades:

Key Trends

  • Professionalization of cybercrime — Criminal operations now resemble legitimate businesses with customer service, SLAs, affiliate programs, and specialized supply chains
  • Convergence of criminal and state activity — Some nation-states (notably North Korea) use cybercrime to fund state objectives; others tolerate criminal groups operating from their territory as long as they do not target domestic interests
  • Supply chain targeting — Adversaries increasingly compromise trusted software providers, managed service providers, and hardware supply chains to gain access to downstream targets at scale (e.g., SolarWinds 2020, Kaseya 2021)
  • Living-off-the-land — Adversaries increasingly use legitimate tools already present in target environments (PowerShell, WMI, certutil, legitimate remote access tools) to avoid detection
  • Exploitation speed — The time between vulnerability disclosure and active exploitation has compressed from months to days or hours
  • Cloud and identity targeting — As organizations migrate to cloud environments, adversaries have followed, targeting identity providers, OAuth tokens, and cloud misconfigurations

Key Takeaways

  • The four major threat actor categories — nation-state, cybercriminal, hacktivist, and insider — differ fundamentally in motivation, capability, and persistence
  • Nation-state APTs represent the most capable and persistent threat, with well-documented groups attributed to Russia, China, North Korea, Iran, and others
  • The cybercriminal ecosystem has professionalized, with RaaS models, initial access brokers, and specialized supply chains
  • The boundary between hacktivism and state-aligned operations has blurred, complicating threat assessment
  • An organization's sector, geography, and data holdings determine which threat actors are most relevant
  • The threat landscape continues to evolve toward supply chain targeting, identity-focused attacks, and living-off-the-land techniques

Practical Exercise

Threat Profile for Your Organization

  1. Identify your organization's sector (e.g., healthcare, finance, government, technology).
  2. Using the motivations matrix above, determine which motivations are most relevant to your sector.
  3. Research one specific threat group that targets your sector using public sources (MITRE ATT&CK Groups page, vendor reports, CISA advisories).
  4. Write a brief threat profile:
    • Group name and attribution
    • Primary motivation
    • Known targeting patterns (sectors, geographies)
    • Two to three notable TTPs from MITRE ATT&CK
    • Assessment: How relevant is this group to your organization? (High/Medium/Low, with reasoning)

If you do not work in an organization, choose a sector that interests you and complete the exercise hypothetically.

Further Reading

  • MITRE ATT&CK Groupsattack.mitre.org/groups. Comprehensive profiles of documented threat groups with mapped techniques and associated software.
  • CISA Known Exploited Vulnerabilities Catalogcisa.gov/known-exploited-vulnerabilities-catalog. A maintained list of vulnerabilities known to be actively exploited, essential for understanding current threats.
  • "APT1: Exposing One of China's Cyber Espionage Units" — Mandiant (2013). The landmark report that established the model for public threat group attribution.
  • Verizon Data Breach Investigations Report (DBIR) — Published annually. Provides data-driven analysis of breach trends across industries, useful for understanding the threat landscape statistically.