{"id":18678,"date":"2021-09-20T14:23:29","date_gmt":"2021-09-20T14:23:29","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18678"},"modified":"2025-04-29T18:08:33","modified_gmt":"2025-04-29T18:08:33","slug":"cyber-threat-actors-and-their-methods-of-attack-module-1","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/","title":{"rendered":"Cyber Threat Actors and Their Methods of Attack: Module 1"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cyber threats are everywhere, and they evolve non-stop. Businesses these days need to actively protect company, employee, client, and partner information no matter what industry they&#8217;re in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers are generally after industries they can exploit for large financial gain and personal information. The more data you store, the higher the risk of attracting the attention of cyber threat actors.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We&#8217;re starting a set of articles consisting of 5 modules that will dwell on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Who can be after your company information?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What methods, tactics, and techniques do they use?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The first module introduces the basics of threat and threat actor-related terminology and describes the notions of a cyber attack, with a simple email example.<\/span><\/p>\n<h2><b>Cyber Threat Actors: Main Terms You Need To Know<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Before we go on into threat actors and their tactics, here are a few terms that will help you navigate the topic.\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat actor:<\/b><span style=\"font-weight: 400;\"> A person, group, or entity representing a threat to a company&#8217;s cyber security.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cyberattack:<\/b><span style=\"font-weight: 400;\"> The stealing, modification, or destruction of a company-owned data or asset.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat:<\/b><span style=\"font-weight: 400;\"> Any activity that puts a company&#8217;s data or assets in harm&#8217;s way.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vulnerability: <\/b><span style=\"font-weight: 400;\">A weakness that could be exploited or triggered by a cyber threat actor.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Loss:<\/b><span style=\"font-weight: 400;\"> The negative effect due to compromised sensitive information in an organization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Cyber risk:<\/b><span style=\"font-weight: 400;\"> The probability of a threat, which can cause vulnerability exploitation and compromised data (loss).<\/span><\/li>\n<\/ul>\n<h2><\/h2>\n<h2><b>What&#8217;s a Cyber Attack: An Example<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">One of the widespread attacks is the social engineering type, where somebody from the organization needs to fall prey to a malicious URL or an attachment. These are usually sent in an email to unsuspecting facilitators.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A vivid example of a <a href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\">social engineering attack<\/a> is the <a href=\"https:\/\/www.ibm.com\/think\/security\" target=\"_blank\" rel=\"noopener\">Dyre Wolf campaign<\/a>, which has stolen more than $1 million from targeted companies using various Dyre Trojan malware. While widespread viruses attack individual users, the uniqueness of <a href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\">social engineering attacks<\/a> is their company-oriented nature. As a result, large businesses continually lose millions of dollars every year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here is how it works.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Caroline works at an IT company as an accountant. It&#8217;s almost lunchtime, and she gets an email from the company&#8217;s CEO saying &#8220;Please, check out the attached file and transfer the mentioned sum.&#8221;<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"wp-image-18681 alignnone\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-1-1200x900-2-1024x768.png\" alt=\"email that might be a cyber threat \" width=\"391\" height=\"293\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-1-1200x900-2-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-1-1200x900-2-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-1-1200x900-2-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-1-1200x900-2.png 1200w\" sizes=\"(max-width: 391px) 100vw, 391px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Assuming that the real CEO sent the email, she downloads the file. While she&#8217;s reading the document, malware loads onto her computer in the background. As a result, the cybercriminal gets a backdoor to Caroline&#8217;s computer. <\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-18684\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-2-1200x900-1-1024x768.png\" alt=\"cyber attack victim downloading malware \" width=\"392\" height=\"294\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-2-1200x900-1-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-2-1200x900-1-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-2-1200x900-1-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-2-1200x900-1.png 1200w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">The next step is to mislead the prey with an error message during login. Something along the lines of the following pops up: &#8220;There was an issue with your login. Call us at 503-3333&#8221;.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-18685\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-3-1200x900-1-1024x768.png\" alt=\"cyber threat issue with credentials \" width=\"390\" height=\"293\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-3-1200x900-1-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-3-1200x900-1-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-3-1200x900-1-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-3-1200x900-1.png 1200w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Trying to solve the problem, Caroline phones the number, and somebody on the other side of the line, a fake bank employee, asks her to verify the bank login details. With the information gained, the cybercriminal can access the company&#8217;s account and manipulate it as they wish. Namely, they can steal money or even change the password, robbing the company of access to their assets. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Then, the cyber threat actor will likely distract Caroline with a denial of service message, stalling her until they finish the attack.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18686\" src=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-4-1200x900-1-1024x768.png\" alt=\"network and computer problems after a cyber attack \" width=\"407\" height=\"305\" srcset=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-4-1200x900-1-1024x768.png 1024w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-4-1200x900-1-300x225.png 300w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-4-1200x900-1-768x576.png 768w, https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/image-4-1200x900-1.png 1200w\" sizes=\"(max-width: 407px) 100vw, 407px\" \/><\/p>\n<p>That is all for our first module! We&#8217;ll continue discovering more about cyber threat actors in the <a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/\">module 2<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber threats are everywhere, and they evolve non-stop. &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199],"tags":[],"class_list":["post-18678","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Actors and Their Methods of Attack: Module 1 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Actors and Their Methods of Attack: Module 1\" \/>\n<meta property=\"og:description\" content=\"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-20T14:23:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-29T18:08:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Cyber Threat Actors and Their Methods of Attack: Module 1\",\"datePublished\":\"2021-09-20T14:23:29+00:00\",\"dateModified\":\"2025-04-29T18:08:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/\"},\"wordCount\":556,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/\",\"name\":\"Cyber Threat Actors and Their Methods of Attack: Module 1 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"datePublished\":\"2021-09-20T14:23:29+00:00\",\"dateModified\":\"2025-04-29T18:08:33+00:00\",\"description\":\"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-and-their-methods-of-attack-module-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Cyber Threat Actors and Their Methods of Attack: Module 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Actors and Their Methods of Attack: Module 1 | EasyDMARC","description":"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Actors and Their Methods of Attack: Module 1","og_description":"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.","og_url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-20T14:23:29+00:00","article_modified_time":"2025-04-29T18:08:33+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Cyber Threat Actors and Their Methods of Attack: Module 1","datePublished":"2021-09-20T14:23:29+00:00","dateModified":"2025-04-29T18:08:33+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/"},"wordCount":556,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/","url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/","name":"Cyber Threat Actors and Their Methods of Attack: Module 1 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","datePublished":"2021-09-20T14:23:29+00:00","dateModified":"2025-04-29T18:08:33+00:00","description":"In this series of articles we will present Cyber threat Actors and how cyber threats attack businesses and organizations.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","width":1440,"height":910,"caption":"top image 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Cyber Threat Actors and Their Methods of Attack: Module 1"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18678","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18678"}],"version-history":[{"count":1,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18678\/revisions"}],"predecessor-version":[{"id":46655,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18678\/revisions\/46655"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18703"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}