{"id":18708,"date":"2021-09-21T14:30:28","date_gmt":"2021-09-21T14:30:28","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18708"},"modified":"2026-01-20T11:23:28","modified_gmt":"2026-01-20T11:23:28","slug":"cyber-threat-actors-motivations-and-tactics-module-2","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/","title":{"rendered":"Cyber Threat Actors &#8211; Motivations and Tactics: Module 2"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Data breaches have become commonplace, and any business and governmental organization can be a target. It&#8217;s become crucial to know the difference between threat actors, their motivation, and what you should expect. In <a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-and-their-methods-of-attack-module-1\/\">module 1<\/a> we have discussed Cyber Threat terms that are helpful to know as well as what is a cyber attack.\u00a0<\/span><\/p>\n<h2><b>Cyber Threat Actors and Their Motivations<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber threat actors are individuals or coordinated groups that attack people or organizations for personal, national, social, or political gain. Below, we cover the most prominent categories and their motivations.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Script kiddies:<\/b><span style=\"font-weight: 400;\"> A malicious hacker with little or no experience. They use an existing script or application to launch hacking attacks. While their motivation can be boredom or peer recognition, they can still cause profound damage to the company.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hacktivists:<\/b><span style=\"font-weight: 400;\"> Individuals who use their hacking skills to achieve social, political, or ideological goals. Their actions can result in government-related and high-impact disruptions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Gray hat hackers:<\/b><span style=\"font-weight: 400;\"> Experienced individuals with extensive knowledge of breaking into computer networks. Their motivations are usually without malicious intent. Still, they may sometimes violate laws or have lax ethical standards. Their goal may be to leak stories to the media, track down debtors, conduct private investigations, and adjust insurance premiums.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Insiders:<\/b><span style=\"font-weight: 400;\"> These are individuals that have current or former relations with the company (employees, contractors, or business partners). They usually have authorized access to the company&#8217;s resources and intentionally misuse their position to affect the company&#8217;s information system, causing loss.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Nation-state hackers:<\/b><span style=\"font-weight: 400;\"> These are also called Advanced Persistent Threats (APT). They&#8217;re highly experienced and act in groups. In some cases, they&#8217;re administered by governments and deal with national security level information. These groups carry on the attacks on high-impact geopolitical sources and until they succeed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Terrorist groups: <\/b><span style=\"font-weight: 400;\">Like in real life, in the digital world, too, these groups aim at disruption and inducing fear for political, religious, and social change. The attacks by these groups are malicious or even violent in nature.<\/span><\/li>\n<\/ul>\n<h2><b>What Tactics Do Cyber Threat Actors Use?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Cyber threat actors use various methods and attack types to steal their victims&#8217; personal information, assets, or money. Attacks vary in what they target. Some attacks target software and hardware faults, while others exploit human vulnerabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The latter category is called social engineering. To carry out the attack, the cybercriminal:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Studies the victims for a while<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Infiltrates their &#8220;inbox&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Exploits the available resources<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Swiftly leaves with no trace<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">The threat actor makes it their goal to put you in a position where you act based on emotion. These include urgency prompts, making a quick decision, and heightened emotional state. It&#8217;s also typical for the message to be too good for the reality or offer help you didn&#8217;t ask for. One of the best examples of a <a href=\"https:\/\/easydmarc.com\/blog\/14-types-of-social-engineering-attacks\/\">social engineering attack<\/a> is the notorious &#8220;Nigerian prince&#8221; that left you a pile of money.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Below are a few widespread social engineering attack types:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email phishing:<\/b><span style=\"font-weight: 400;\"> A cyberthreat where the attacker gathers data by sending deceptive emails to the victims.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Vishing (voice phishing):<\/b><span style=\"font-weight: 400;\"> This type of attack uses voicemails to steal personal confidential information (bank or credit card numbers). The cybercriminals pretend to be a representative of a reputable company.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Smishing (SMS phishing):<\/b><span style=\"font-weight: 400;\"> The malicious URL gets to you in an SMS. In this case, the attacker can also ask you to reply to the message.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Spear phishing:<\/b><span style=\"font-weight: 400;\"> Unlike phishing attacks, this variation is targeted to a specific individual. The threat actor can be after financial, personal, employer, or other information. <\/span><a href=\"https:\/\/www.digitalguardian.com\/blog\/what-is-spear-phishing-defining-and-differentiating-spear-phishing-and-phishing\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">About 91% of attacks<\/span><\/a><span style=\"font-weight: 400;\"> account for this type.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Whaling:<\/b><span style=\"font-weight: 400;\"> This is similar to phishing, but the attacker goes after people that possess a significant amount of valuable data. Senior executives are a typical target for these attacks. However, these are harder to carry out, as the victims are more knowledgeable than the general audience.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pretexting:<\/b><span style=\"font-weight: 400;\"> The threat actor makes up a story or a situation (the pretext) where the victim has to provide personal information for a supposed reward. One example is &#8220;receiving&#8221; a heritage (house or money).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Pharming:<\/b><span style=\"font-weight: 400;\"> This word is a combination of &#8220;phishing&#8221; and &#8220;farming.&#8221; The attacker creates a fake website that looks like a legitimate one and sends traffic to it. There, the website acts as a host of malware or some information-stealing mechanism.<\/span><\/li>\n<\/ul>\n<h3><span style=\"font-weight: 400;\">Another category of attacks doesn&#8217;t require the victim to take action. These include:<\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Dumpster diving: <\/b><span style=\"font-weight: 400;\">As the name suggests, the cybercriminal searches for information in the victim&#8217;s trash.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Shoulder surfing:<\/b><span style=\"font-weight: 400;\"> The threat actor obtains personal information while the victim is oblivious during data entry into a device. For example, someone could overlook your credit card pin while you&#8217;re at the ATM, then steal your physical card and gain access to your funds.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Mail theft:<\/b><span style=\"font-weight: 400;\"> This is the act of stealing information from a physical mailbox.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">To this point, we were talking about methods of vulnerability exploitation. But what happens when the attacker gets into your device? Here are a few was the situation could develop:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identity theft:<\/b><span style=\"font-weight: 400;\"> This is the process of acquiring the victim&#8217;s personal information (credentials, ID, or credit card number). Later the cybercriminal uses it for fraudulent activity or other crimes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Privacy invasion:<\/b><span style=\"font-weight: 400;\"> While identity theft causes an external vulnerability, privacy invasion brings third-party threats to your door. Collecting and selling personal data can result in anything between unwanted ads on social media and scare-inducing messages.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Malware (malicious software):<\/b><span style=\"font-weight: 400;\"> This is a file or code usually delivered due to a phishing attack. Once the person clicks the link, their software gets infected. Viruses can infect anything from a single file to taking down whole networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Man-in-the-middle:<\/b><span style=\"font-weight: 400;\"> This is a type of eavesdropping attack. After intercepting the online communication or transfer, the attackers pretend to be legitimate participants.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">As both software and hardware evolve, threat actors also develop new methods and tactics. Thus, businesses and individuals need to protect themselves against emerging threats actively. Go to the <a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-how-to-spot-phishing-emails\/\">next module<\/a> to learn more about recognizing a phishing attack when you see it.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches have become commonplace, and any business &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18703,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[204,290,199],"tags":[],"class_list":["post-18708","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cyberattacks-cyberthreats","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Threat Actors - Motivations and Tactics: Module 2 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Actors - Motivations and Tactics: Module 2\" \/>\n<meta property=\"og:description\" content=\"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-09-21T14:30:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-20T11:23:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Cyber Threat Actors &#8211; Motivations and Tactics: Module 2\",\"datePublished\":\"2021-09-21T14:30:28+00:00\",\"dateModified\":\"2026-01-20T11:23:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/\"},\"wordCount\":1007,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"articleSection\":[\"Blog\",\"Cyberattacks and Cyberthreats\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/\",\"name\":\"Cyber Threat Actors - Motivations and Tactics: Module 2 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"datePublished\":\"2021-09-21T14:30:28+00:00\",\"dateModified\":\"2026-01-20T11:23:28+00:00\",\"description\":\"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/cyber-threat-actors-motivations-and-tactics-module-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyberattacks and Cyberthreats\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/cyberattacks-cyberthreats\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Cyber Threat Actors &#8211; Motivations and Tactics: Module 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Threat Actors - Motivations and Tactics: Module 2 | EasyDMARC","description":"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Actors - Motivations and Tactics: Module 2","og_description":"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect","og_url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-09-21T14:30:28+00:00","article_modified_time":"2026-01-20T11:23:28+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Cyber Threat Actors &#8211; Motivations and Tactics: Module 2","datePublished":"2021-09-21T14:30:28+00:00","dateModified":"2026-01-20T11:23:28+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/"},"wordCount":1007,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","articleSection":["Blog","Cyberattacks and Cyberthreats","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/","url":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/","name":"Cyber Threat Actors - Motivations and Tactics: Module 2 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","datePublished":"2021-09-21T14:30:28+00:00","dateModified":"2026-01-20T11:23:28+00:00","description":"In this series of articles we will present Cyber threat Actors and the difference between threat actors, their motivation, and what you should expect","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","width":1440,"height":910,"caption":"top image 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/cyber-threat-actors-motivations-and-tactics-module-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyberattacks and Cyberthreats","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/cyberattacks-cyberthreats\/"},{"@type":"ListItem","position":5,"name":"Cyber Threat Actors &#8211; Motivations and Tactics: Module 2"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-1.jpg","_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18708"}],"version-history":[{"count":2,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18708\/revisions"}],"predecessor-version":[{"id":57541,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18708\/revisions\/57541"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18703"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18708"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}