INDEX

Cyber Threat Agents

A newer version of this research is available: Cyber Threat Agents

This Market Data lists highly visible active cyber threat agents in 2H 2015. This includes their status (i.e., whether they are active or not), name, region (origin), affiliation (to other cyber agents and groups), motivations (hacktivism, political, or financial), their main targets (government, business, international organizations, education, countries, industries, etc.), the tools created, if any (malware, exploit kits, ransomware, etc.), their attack/threat specialty and the tools they use to commit offences (breached accounts, trojans, data dumps, leaked emails, SQLi, etc.), and finally some further comments about the agents. 

Table of Contents

Charts

  1. Cyber Threat Agents by Motivations, 2H 2015
  2. Cyber Threat Agents by Region, 2H 2015

Tables

Click a table title to see what's included in the data.
  1. Cyber Threat Agents, 2H 2015