Technical Capabilities
- Understands attack techniques conceptually
- Can modify existing exploits
- Capable of targeted social engineering
- Basic operational security awareness
- Can chain multiple vulnerabilities
Attack Patterns
- Targeted prompt injection attacks
- Social engineering to obtain access
- Credential stuffing and password attacks
- Malicious plugin development
- Persistence through configuration changes
Typical Targets
- Specific individuals or organizations
- Competitors or former employers
- Systems with valuable data
- Cryptocurrency-related applications
Relevant AATT Threats
Threat ID
Threat Name
Likelihood
AATT-C1
Targeted Prompt Injection
High
AATT-C2
Social Engineering
High
AATT-C3
Context Manipulation
Medium
AATT-E1
Data Exfiltration
Medium
AATT-E4
Tool Abuse
Medium
AATT-S1
Malicious Plugin
Medium
Defensive Focus
L2 controls recommended for A2 threat protection
Session isolation prevents cross-contamination
Supply chain controls detect malicious plugins
Audit logging enables incident investigation
A3: Organized Crime
Profile
Attribute
Value
Capability
High
Resources
Significant financial backing
Persistence
High
Sophistication
Professional operations
Primary Motivation
Financial gain, ransomware, data theft
Characteristics
Technical Capabilities
- Professional malware development
- Exploit research and development
- Infrastructure for large-scale attacks
- Money laundering capabilities
- Affiliate and RaaS models
Attack Patterns
- Supply chain compromise at scale
- Advanced persistent threats (APT-lite)
- Ransomware deployment
- Cryptomining operations
- Credential marketplace operations
Typical Targets
- Organizations with valuable IP
- Financial institutions
- Healthcare providers
- Critical infrastructure
- Software supply chains
Relevant AATT Threats
Threat ID
Threat Name
Likelihood
AATT-C1
Sophisticated Prompt Injection
High
AATT-S1
Supply Chain Trojan
High
AATT-S2
Dependency Confusion
High
AATT-E1
Large-scale Data Exfiltration
High
AATT-E5
Sandbox Escape
Medium
AATT-E6
Capability Escalation
Medium
Defensive Focus
L2 controls required, L3 recommended
Rigorous supply chain verification essential
Network monitoring for C2 detection
Incident response preparation critical
A4: Nation State
Profile
Attribute
Value
Capability
Very High
Resources
Unlimited (state backing)
Persistence
Very High
Sophistication
Elite technical capabilities
Primary Motivation
Espionage, sabotage, influence
Characteristics
Technical Capabilities
- Zero-day exploit development
- Custom malware frameworks
- Hardware implant capabilities
- SIGINT integration
- Years-long operation timelines
- Ability to compromise any software supply chain
Attack Patterns
- Long-term strategic compromise
- Supply chain infiltration
- Trusted insider recruitment
- Stealthy data exfiltration
- Pre-positioned access for future use
- Destructive attacks (when authorized)
Typical Targets
- Defense contractors
- Critical infrastructure
- Government agencies
- Strategic technology companies
- Research institutions
- Political organizations
Relevant AATT Threats
Threat ID
Threat Name
Likelihood
AATT-C1-C5
All Coercion Attacks
High
AATT-S1-S4
All Supply Chain Attacks
High
AATT-E1-E6
All Escalation Attacks
High
AATT-P1-P3
All Persistence Attacks
High
Defensive Focus
L3 controls required for nation-state protection
Formal verification of critical components
Hardware security module integration
Comprehensive audit trails
Assume breach mentality
Regular third-party assessments
Warning: Complete protection against nation-state actors is extremely difficult. L3 controls raise the cost of attack but cannot guarantee prevention. Focus on detection and response capabilities.
A5: Insider
Profile
Attribute
Value
Capability
Variable (based on role)
Resources
Legitimate access
Persistence
Variable
Sophistication
Variable
Primary Motivation
Financial, revenge, ideology, coercion
Characteristics
Technical Capabilities
- Legitimate system access
- Knowledge of internal systems
- Ability to bypass perimeter controls
- Understanding of detection mechanisms
- Access to sensitive data
Insider Types
| Type | Description | Risk Level |
|------|-------------|------------|
| Negligent | Unintentional security violations | Medium |
| Compromised | Credentials stolen by external actor | High |
| Malicious | Intentional harmful actions | High |
| Third-party | Contractor or vendor with access | Medium-High |
Attack Patterns
- Data theft using legitimate access
- Privilege abuse
- Sabotage of systems or data
- Installation of backdoors
- Credential sharing or selling
- Social engineering of colleagues