Cyber Threat Agents

A newer version of this research is available.

Please refer to Cyber Threat Agents to ensure you are viewing the latest forecasts.

This Market Data lists highly visible active cyber threat agents in FY 2013. This includes their status (i.e., whether they are active or not), name, region (origin), affiliation (to other cyber agents and groups), motivations (hacktivism, political, or financial), their main targets (government, business, international organizations, education, countries, industries, etc.), the tools created, if any (malware, exploit kits, ransomware, etc.), their attack/threat specialty and the tools they use to commit offences (breached accounts, trojans, data dumps, leaked emails, SQLi, etc.), and finally some further comments about the agents. This list is a preliminary version which will be updated and published regularly. It is not all inclusive or exhaustive, since cyber agents can be difficult to track and operate in the digital underground, a difficult place to penetrate and with high entry and language barriers, namely with regards to China and Russia.

Table of Contents

Tables

  1. Cyber Threat Agents
Purchase

Research Information

Price
Log In or Register
Publish Date
4Q 2013
Code
MD-CTA-155
Research Type
Data