The Cyberthreat Handbook

The cyber-threat landscape is extremely diversified, and knowing one's enemies can be particularly complex in this world of subterfuge and deception. Thales and Verint have recently released The Cyberthreat Handbook, a report designed to provide insights into the most significant groups of global cyber-attackers.

Thales and Verint experts have worked together to find out more about cyber attackers and the techniques they employ, the purpose being to help organisations in the private and public sectors to better detect and anticipate future attacks. 

The Handbook details the activities of approximately 60 major groups of cyber-attackers throughout the world, discovering that almost half of the groups analysed were state-sponsored, often aiming to steal sensitive data from targets of geopolitical interest. Just over a quarter were named as ideologically-motivated hacktivists, followed by financially-driven cyber-criminals and cyber-terrorists.

The  Handbook also offers a warning  that all the world’s major economic, political and military powers are priority targets of cyber attackers, and that the sectors most targeted are nation states and their defense capabilities, followed by the financial sector, energy and transportation.

It also notes that a growing number of groups of attackers are now focusing on vulnerabilities in the supply chain, and in particular on smaller partners, suppliers and service providers that are used as Trojans to access major targets. Analysts from Thales and Verint have defined four major categories of attackers based on their motives and ultimate objectives. 

  • Out of approximately sixty major groups of attackers analysed, 49% are state-sponsored groups often aiming to steal sensitive data from targets of geo-political interest. 
  •  26% are ideologically motivated hacktivists. 
  •  Cyber-criminals (20%) who are driven by financial gain. 
  •  Cyber-terrorists account for 5% of the groups analysed.

The 12 countries in the world with the highest GDP are all at the top of the list of targets, headed by the United States, Russia, the European Union (particularly the United Kingdom, France and Germany) and China, followed by India, South Korea and Japan.

 “The Thales and Verint teams are immensely proud to release this report as part of its technology and domain expertise cooperation.... Unique in its breadth and depth, it is the culmination of many months of research, investigation and painstaking analysis and correlation of relevant data. As cyber-threats proliferate and evolve, cyber-security clearly has a major role to play, particularly for critical infrastructure providers.” said Marc Darmon, EVP, of Thales secure communications and information systems division.

Elad Sharon, president, Verint Cyber Intelligence Solutions, added: “This report generates unique insights and knowledge into cyber and security experts” and can be used, “to mitigate and foresee cyber-attacks.”

Thales Group:        Infosecurity:       MobileWorld

You Might Also Read:

Top Six Cyber Secure Countries:

The Biggest International Cybercime Offenders:

 

« Happy Days Ahead For 5G Hackers
Protect Your Organisation From Employee Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

aizoOn Technology Consulting

aizoOn Technology Consulting

aizoOn is a technology consulting company offering a range of services including IoT & embedded security, mobile security, cybersecurity assessments, risk & compliance, network monitoring and more.

Research Institute in Trustworthy Industrial Control Systems (RITICS)

Research Institute in Trustworthy Industrial Control Systems (RITICS)

RITICS is one of three Research Institutes formed as part of the UK National Cyber Security Strategy.

CommuniTake

CommuniTake

CommuniTake builds security, enablement, and management solutions to provide people and organizations with better, and more secure mobile device use.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

Matrix42

Matrix42

Matrix42 software for digital workspace experience manages devices, applications, processes and services simple, secure and compliant.

Cryptshare

Cryptshare

Cryptshare is a communication solution that enables you to share e-mails and files of any size securely.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Kentik

Kentik

Kentik - one platform for Network Visibility, Performance, and Security.

10dot Cloud Security

10dot Cloud Security

10dot Cloud Security is a security service management company. Our solutions give you contextualised visibility into your network security.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

RMC

RMC

RMC was purpose-built for Mission Assurance and ICS/OT cybersecurity, dedicated to strengthening and protecting government and commercial assets.

Telesystem

Telesystem

Telesystem empowers businesses across the USA with a range of innovative network, communication and collaboration solutions.

SecureCyber

SecureCyber

Secure Cyber Defense offers industry-leading technology and managed detection and response solutions.