The Cyberthreat Handbook

The cyber-threat landscape is extremely diversified, and knowing one's enemies can be particularly complex in this world of subterfuge and deception. Thales and Verint have recently released The Cyberthreat Handbook, a report designed to provide insights into the most significant groups of global cyber-attackers.

Thales and Verint experts have worked together to find out more about cyber attackers and the techniques they employ, the purpose being to help organisations in the private and public sectors to better detect and anticipate future attacks. 

The Handbook details the activities of approximately 60 major groups of cyber-attackers throughout the world, discovering that almost half of the groups analysed were state-sponsored, often aiming to steal sensitive data from targets of geopolitical interest. Just over a quarter were named as ideologically-motivated hacktivists, followed by financially-driven cyber-criminals and cyber-terrorists.

The  Handbook also offers a warning  that all the world’s major economic, political and military powers are priority targets of cyber attackers, and that the sectors most targeted are nation states and their defense capabilities, followed by the financial sector, energy and transportation.

It also notes that a growing number of groups of attackers are now focusing on vulnerabilities in the supply chain, and in particular on smaller partners, suppliers and service providers that are used as Trojans to access major targets. Analysts from Thales and Verint have defined four major categories of attackers based on their motives and ultimate objectives. 

  • Out of approximately sixty major groups of attackers analysed, 49% are state-sponsored groups often aiming to steal sensitive data from targets of geo-political interest. 
  •  26% are ideologically motivated hacktivists. 
  •  Cyber-criminals (20%) who are driven by financial gain. 
  •  Cyber-terrorists account for 5% of the groups analysed.

The 12 countries in the world with the highest GDP are all at the top of the list of targets, headed by the United States, Russia, the European Union (particularly the United Kingdom, France and Germany) and China, followed by India, South Korea and Japan.

 “The Thales and Verint teams are immensely proud to release this report as part of its technology and domain expertise cooperation.... Unique in its breadth and depth, it is the culmination of many months of research, investigation and painstaking analysis and correlation of relevant data. As cyber-threats proliferate and evolve, cyber-security clearly has a major role to play, particularly for critical infrastructure providers.” said Marc Darmon, EVP, of Thales secure communications and information systems division.

Elad Sharon, president, Verint Cyber Intelligence Solutions, added: “This report generates unique insights and knowledge into cyber and security experts” and can be used, “to mitigate and foresee cyber-attacks.”

Thales Group:        Infosecurity:       MobileWorld

You Might Also Read:

Top Six Cyber Secure Countries:

The Biggest International Cybercime Offenders:

 

« Happy Days Ahead For 5G Hackers
Protect Your Organisation From Employee Data Theft »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Caliber Security Partners

Caliber Security Partners

Caliber Security Partners is a full-service information security company, with a wide range of security services for clients with varying levels of security maturity.

Egerie

Egerie

EGERIE's RiskManager solution provides a Global, Centralized, and Updated view of risk maps and security measures for your company.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

Suridata

Suridata

Suridata’s SaaS Security platform enables organizations to secure the use of SaaS applications.

TotalAV

TotalAV

TotalAV Antivirus is a free-to-use app packed with all the essential features to find and remove malware, keeping you safe.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Data Defenders

Data Defenders

Data Defenders provide information security technology solutions that empower consumers, businesses and governments with safe and secure IT and cybersecurity infrastructures.

Vercara

Vercara

Vercara offers a purpose-built, global cloud security platform that provides layers of protection to safeguard businesses’ online presence, no matter where an attack comes from or where it is aimed.

Iolo

Iolo

Iolo develops patented technology and award-winning software that repairs, optimizes, and protects computers, to maximize system speed and performance while keeping them safe.

Seal Security

Seal Security

Seal Security revolutionizes software supply chain security operations, empowering organizations to automate and scale their open source vulnerability remediation and patch management.

Zanutix Consulting

Zanutix Consulting

Zanutix specialize in a wide range of services including Network Design and Implementation, Data Management, Cloud Solutions, Software Development and Cybersecurity.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.