The Cyberthreat Handbook

The cyber-threat landscape is extremely diversified, and knowing one's enemies can be particularly complex in this world of subterfuge and deception. Thales and Verint have recently released The Cyberthreat Handbook, a report designed to provide insights into the most significant groups of global cyber-attackers.

Thales and Verint experts have worked together to find out more about cyber attackers and the techniques they employ, the purpose being to help organisations in the private and public sectors to better detect and anticipate future attacks. 

The Handbook details the activities of approximately 60 major groups of cyber-attackers throughout the world, discovering that almost half of the groups analysed were state-sponsored, often aiming to steal sensitive data from targets of geopolitical interest. Just over a quarter were named as ideologically-motivated hacktivists, followed by financially-driven cyber-criminals and cyber-terrorists.

The  Handbook also offers a warning  that all the world’s major economic, political and military powers are priority targets of cyber attackers, and that the sectors most targeted are nation states and their defense capabilities, followed by the financial sector, energy and transportation.

It also notes that a growing number of groups of attackers are now focusing on vulnerabilities in the supply chain, and in particular on smaller partners, suppliers and service providers that are used as Trojans to access major targets. Analysts from Thales and Verint have defined four major categories of attackers based on their motives and ultimate objectives. 

  • Out of approximately sixty major groups of attackers analysed, 49% are state-sponsored groups often aiming to steal sensitive data from targets of geo-political interest. 
  •  26% are ideologically motivated hacktivists. 
  •  Cyber-criminals (20%) who are driven by financial gain. 
  •  Cyber-terrorists account for 5% of the groups analysed.

The 12 countries in the world with the highest GDP are all at the top of the list of targets, headed by the United States, Russia, the European Union (particularly the United Kingdom, France and Germany) and China, followed by India, South Korea and Japan.

 “The Thales and Verint teams are immensely proud to release this report as part of its technology and domain expertise cooperation.... Unique in its breadth and depth, it is the culmination of many months of research, investigation and painstaking analysis and correlation of relevant data. As cyber-threats proliferate and evolve, cyber-security clearly has a major role to play, particularly for critical infrastructure providers.” said Marc Darmon, EVP, of Thales secure communications and information systems division.

Elad Sharon, president, Verint Cyber Intelligence Solutions, added: “This report generates unique insights and knowledge into cyber and security experts” and can be used, “to mitigate and foresee cyber-attacks.”

Thales Group:        Infosecurity:       MobileWorld

You Might Also Read:

Top Six Cyber Secure Countries:

The Biggest International Cybercime Offenders:

 

« Happy Days Ahead For 5G Hackers
Protect Your Organisation From Employee Data Theft »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WIRED

WIRED

WIRED is the magazine about what's next – the people, the trends and the big ideas that will change our lives. Topics covered include cyber security.

Shape Security

Shape Security

Shape Security provide best-in-class defense against malicious automated cyberattacks on web and mobile applications.

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC)

Dubai Electronic Security Center (DESC) was founded to develop and implement information security practices in Dubai.

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Kingsley Napley

Kingsley Napley

Cyber crime is an area of growing legal complexity. Our team of cyber crime lawyers have vast experience of the law in this area.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

CHT Security

CHT Security

CHT Security is a Managed Security Service Provider (MSSP) specialized in cyber security technologies enabling enterprises to defense against cyber threats to networks, gateways and endpoints.

Ensighten

Ensighten

Ensighten is a leader in Website Security & Privacy Compliance. Protect your website from malicious attacks, monitor & detect vulnerabilities, protect consumer data.

Nucleus Security

Nucleus Security

Nucleus is a leading Vulnerability Management platform for Large Enterprises, MSPs/MSSPs, and Application Security Teams that want more from their vulnerability management tools.

apiiro

apiiro

apiiro invented the industry-first Code Risk Platform™ that uses developers and code behavior analysis to accelerate delivery and automatically remediate product risk.

Ascent Cyber

Ascent Cyber

Ascent Cyber provide simple and stress-free solutions to protect your business and its customers from the worries and costs of cybercrime.

PA Consulting

PA Consulting

PA Consulting Group is a consultancy that specialises in strategy, technology and innovation. Our cyber security experts work with you to spot digital and technology security risks and reduce them.

Matrium Technologies

Matrium Technologies

Matrium Technologies has been a leading provider of technology solutions since 1991, with a strong industry background in Network Testing, Network Visibility and Security.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Karthik Consulting (KC)

Karthik Consulting (KC)

Karthik Consulting is a technology service provider specializing in IT services for the U.S. federal government.