Skip to content

Chapter 22 Quiz: Threat Actor Encyclopedia

Test your knowledge of APT groups, eCrime actors, motivations, TTP fingerprinting, and threat actor attribution methodology.


Questions

1. APT28 (Fancy Bear) is attributed to which nation-state intelligence service, and what is their primary strategic motivation based on observed targeting patterns?

  • A) China's MSS — economic espionage targeting technology companies
  • B) Russia's GRU (Military Intelligence) — political and military intelligence collection, election interference, and supporting Russian state objectives
  • C) North Korea's Lazarus Group — cryptocurrency theft for regime financing
  • D) Iran's APT33 — critical infrastructure disruption
Answer

B — Russia's GRU (Military Intelligence) — political and military intelligence collection, election interference, and supporting Russian state objectives

APT28 (also known as Fancy Bear, STRONTIUM, Sofacy) is attributed with high confidence to Russia's General Staff Main Intelligence Directorate (GRU). They are known for targeting NATO governments, political organizations (DNC breach 2016), defense contractors, and media organizations. Their operations align with Russian strategic military intelligence requirements.


2. APT41 is unique among Chinese threat actor groups because it conducts both state-sponsored espionage and financially motivated cybercrime. What specific criminal activity has been attributed to APT41 operators acting in a personal capacity?

  • A) Ransomware deployment against Western hospitals
  • B) Video game currency fraud — manipulating in-game economies to steal virtual goods for resale
  • C) Cryptocurrency exchange theft
  • D) BEC (Business Email Compromise) wire fraud
Answer

B — Video game currency fraud — manipulating in-game economies to steal virtual goods for resale

DOJ indictments against APT41 members specifically alleged that the operators conducted video game fraud as a side business — stealing in-game currencies, items, and source code for personal financial gain. This "moonlighting" distinction is why APT41 is categorized as a "dual nexus" actor: when not conducting state-directed espionage, the same individuals conduct financially motivated cybercrime.


3. Lazarus Group is attributed to the Democratic People's Republic of Korea (DPRK). Which of the following operations is attributed to Lazarus with high confidence and best illustrates their primary financial motivation?

  • A) Operation Aurora (Google China breach)
  • B) Bangladesh Bank SWIFT heist — $81 million stolen via fraudulent SWIFT interbank transfers
  • C) SolarWinds SUNBURST supply chain compromise
  • D) NotPetya wiper deployment against Ukrainian targets
Answer

B — Bangladesh Bank SWIFT heist — $81 million stolen via fraudulent SWIFT interbank transfers

In 2016, Lazarus Group compromised the Bangladesh Bank's SWIFT terminal and issued fraudulent transfer requests to the Federal Reserve Bank of New York. $81 million was successfully transferred before the scheme was detected ($951 million in additional transfers was stopped due to a spelling error). This operation exemplifies Lazarus's mission: generating hard currency for the sanctions-isolated DPRK regime.


4. Volt Typhoon is a Chinese threat actor group identified in 2023. What distinguishes their operational tradecraft from typical espionage actors?

  • A) They exclusively target financial institutions for intellectual property theft
  • B) They rely almost entirely on living-off-the-land (LOTL) techniques — using native OS tools like netsh, wmic, and PowerShell — to blend with normal system administration activity and pre-position on critical US infrastructure
  • C) They use a custom ransomware variant to fund their operations
  • D) They exclusively operate through supply chain compromises of software vendors
Answer

B — They rely almost entirely on living-off-the-land (LOTL) techniques — using native OS tools like netsh, wmic, and PowerShell — to blend with normal system administration activity and pre-position on critical US infrastructure

Volt Typhoon's defining characteristic is minimal malware footprint: they use built-in system tools, proxy traffic through compromised SOHO routers, and focus on pre-positioning in US critical infrastructure (power, water, transportation) sectors — assessed by CISA/NSA as preparation for potential disruptive attacks during a future conflict rather than immediate espionage.


5. FIN7 is classified as an eCrime (financially motivated) threat actor group. What is their primary criminal business model?

  • A) Ransomware deployment under the LockBit brand
  • B) Targeting point-of-sale (POS) systems and restaurant/hospitality chains to harvest payment card data at scale, later sold on criminal markets
  • C) Cryptocurrency theft from DeFi protocols
  • D) Business Email Compromise targeting CFOs for wire fraud
Answer

B — Targeting point-of-sale (POS) systems and restaurant/hospitality chains to harvest payment card data at scale, later sold on criminal markets

FIN7 (also known as Carbanak, Navigator Group) specialized in targeting restaurant, hospitality, and retail chains via spear-phishing, gaining access to POS environments, and deploying custom POS malware (Carbanak, GRIFFON) to harvest credit card data. They compromised hundreds of restaurant chains including Chipotle and Arby's, stealing tens of millions of payment cards over multiple years.


6. Scattered Spider (UNC3944) made headlines in 2023 for major casino breaches. What social engineering technique is central to their initial access methodology?

  • A) Spear-phishing PDF attachments with zero-day exploits
  • B) Vishing (voice phishing) attacks on IT helpdesks — impersonating employees to convince helpdesk staff to reset MFA, issue new credentials, or enroll new devices
  • C) Supply chain compromise of managed service providers
  • D) Physical intrusion to plant hardware keyloggers
Answer

B — Vishing (voice phishing) attacks on IT helpdesks — impersonating employees to convince helpdesk staff to reset MFA, issue new credentials, or enroll new devices

Scattered Spider's defining technique is social engineering IT helpdesks. They research target employees on LinkedIn, use publicly available information to convincingly impersonate them, and call helpdesks requesting MFA resets or new SIM enrollments. This technique bypasses technical controls entirely and exploited helpdesk processes at MGM Resorts and Caesars Entertainment in 2023 breaches.


7. MITRE ATT&CK Groups provides structured, public profiles for documented threat actor groups. What is the primary limitation of using ATT&CK Group profiles for threat intelligence?

  • A) ATT&CK only covers nation-state actors and ignores eCrime groups
  • B) Profiles represent historically observed TTPs and may not reflect a group's current capabilities or techniques — actors evolve their tradecraft, especially after public disclosure of their methods
  • C) ATT&CK Group data is classified and not publicly accessible
  • D) ATT&CK Groups only maps techniques at the tactic level without technique-level detail
Answer

B — Profiles represent historically observed TTPs and may not reflect a group's current capabilities or techniques — actors evolve their tradecraft, especially after public disclosure of their methods

ATT&CK Group profiles are built from public reporting of past incidents. A sophisticated threat actor who reads their own ATT&CK profile will change their tooling, infrastructure, and techniques to avoid those specific detections. This is the "observer effect" in threat intelligence — publishing attribution data simultaneously enables defense and forces actors to adapt.


8. Mandiant uses a naming convention for unattributed threat clusters before formal attribution. What prefix does Mandiant use for these unclassified threat clusters?

  • A) APT (Advanced Persistent Threat)
  • B) FIN (Financially Motivated)
  • C) UNC (Uncategorized)
  • D) TEMP (Temporary classification)
Answer

C — UNC (Uncategorized)

Mandiant's naming convention: APT (nation-state or advanced actor), FIN (financially motivated), and UNC (uncategorized clusters that share some characteristics but lack sufficient evidence for formal grouping). UNC clusters may eventually be merged into existing groups or elevated to named designations as evidence accumulates. Microsoft uses a different convention (weather/element themed names like MIDNIGHT BLIZZARD).


9. When performing TTP fingerprinting to attribute a new intrusion to a known threat actor, which type of indicator provides the highest confidence and longest useful life?

  • A) Command-and-control IP addresses
  • B) Malware file hashes (MD5/SHA-256)
  • C) Behavioral TTPs — the specific sequence of tools, techniques, and procedures used by the actor during their operations
  • D) Domain names registered by the actor
Answer

C — Behavioral TTPs — the specific sequence of tools, techniques, and procedures used by the actor during their operations

The Pyramid of Pain (David Bianco) ranks indicators by attacker cost to change: hash values are trivial to change (recompile), IPs and domains are easy to rotate, but TTPs represent the actor's operational habits — how they move laterally, how they maintain persistence, how they exfiltrate data. Changing TTPs requires retraining and restructuring operations, making behavioral indicators the most durable for attribution and detection.


10. What does "attribution confidence level" mean in the context of a threat intelligence report that states "we assess with moderate confidence that APT28 is responsible for this intrusion"?

  • A) The assessment is 50% accurate by definition of "moderate"
  • B) The evidence supports the attribution finding but does not definitively rule out an alternative explanation — key gaps exist (e.g., possible false flag use of known APT28 tooling by a different actor)
  • C) Only one analyst reviewed the evidence before publication
  • D) The attribution is based solely on OSINT without classified signals intelligence
Answer

B — The evidence supports the attribution finding but does not definitively rule out an alternative explanation — key gaps exist (e.g., possible false flag use of known APT28 tooling by a different actor)

Intelligence confidence levels communicate analytical uncertainty, not probability percentages. "Moderate confidence" means the evidence is credible and consistent with the attribution but there are gaps — perhaps the malware used is known to be APT28's but has been leaked or sold, or the infrastructure overlaps are strong but not unique. High-confidence attribution requires multiple independent, corroborating evidence streams that collectively eliminate other plausible explanations.


Scoring

Score Performance
9–10 Expert — Threat actor knowledge and attribution methodology fully internalized
7–8 Proficient — Ready to produce threat actor-informed intelligence products
5–6 Developing — Review Chapter 22 APT profiles and TTP fingerprinting sections
<5 Foundational — Re-read Chapter 22 before proceeding

Return to Chapter 22 | Next: Chapter 23