Threat Actors and Motivations

Key Takeaways

  • Threat actors are classified by capability, intent, resources, and target selection.
  • Motivation is a major clue: money, ideology, espionage, revenge, disruption, or curiosity.
  • Insiders can be malicious, negligent, or compromised; authorized access is the key clue.
  • Nation-state and advanced persistent threat activity often emphasizes stealth, persistence, and strategic objectives.
  • Organized crime commonly seeks financial gain through ransomware, fraud, credential theft, and extortion.
Last updated: April 2026

Threat Actors and Motivations

Security+ scenarios often describe behavior instead of naming the actor. Identify capability, motive, access, and target.

ActorTypical capabilityCommon motivationScenario clues
Nation-state or APTHighEspionage, disruption, strategic advantageLong dwell time, stealth, custom tooling, sensitive targets
Organized crimeMedium to highFinancial gainRansomware, payment fraud, credential resale, extortion
HacktivistVariableIdeology or publicityDefacement, data leak, DDoS tied to a cause
Insider threatVariableRevenge, financial gain, negligence, convenienceAuthorized access used improperly
CompetitorMediumBusiness advantageProduct plans, pricing, trade secrets
Script kiddie or unskilled attackerLowCuriosity, attention, opportunismPublic tools, noisy scanning, known exploits
Shadow IT userLow to mediumConvenience or speedUnsanctioned cloud app, unmanaged workflow

Motivation Decoder

MotivationLikely behavior
Financial gainRansomware, fraud, card theft, credential theft
EspionageQuiet collection, persistence, targeting sensitive data
IdeologyPublic claims, defacement, disruption, leak campaigns
RevengeDestructive actions, data theft before departure
DisruptionDDoS, wiper malware, sabotage
Curiosity or challengeOpportunistic probing and noisy exploitation

Trap Callout: Skill Does Not Equal Motivation

Do not choose "nation-state" just because an attack is technically complex. A criminal group can use advanced tooling, and a nation-state can use a simple phishing email. Let the goal and target drive the answer.

Scenario Walkthrough

A research lab finds a low-and-slow intrusion that avoids detection, steals project documents over months, and uses custom infrastructure. There is no payment demand. The strongest answer is nation-state or APT because the behavior suggests persistence, stealth, and intelligence collection. If the same lab received a demand note after encrypted file shares, organized crime would be more likely.

Quick Drill

ClueMost likely actor or motivation
Public website replaced with political messageHacktivist
Former employee downloads customer list after resignationMalicious insider
Broad scanning with known exploit scriptsScript kiddie or opportunistic attacker
Ransom note and data leak threatOrganized crime
Stealthy collection of defense project filesNation-state or APT
Team uses personal file sharing to bypass procurementShadow IT risk
Test Your Knowledge

An organization discovers a quiet, months-long intrusion focused on collecting proprietary research. There is no ransom demand or public claim. Which actor is most likely?

A
B
C
D
Test Your Knowledge

A public-facing site is defaced with a political message after the organization takes a controversial position. Which motivation is most likely?

A
B
C
D
Test Your KnowledgeMulti-Select

Which clues point most strongly to an insider threat? Choose two.

Select all that apply

Authorized access used outside job duties
Data copied shortly before resignation
Traffic from a random internet scanner
Expired TLS certificate