{"id":226222,"date":"2021-11-12T15:49:36","date_gmt":"2021-11-12T20:49:36","guid":{"rendered":"https:\/\/www.sightline.com\/?p=226222"},"modified":"2026-02-17T15:48:07","modified_gmt":"2026-02-17T20:48:07","slug":"podcast-threat-actors-and-the-motivation-behind-the-attack","status":"publish","type":"post","link":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/","title":{"rendered":"Podcast: Threat Actors and the Motivation Behind the Attack"},"content":{"rendered":"\n<h1>Threat Actors and the Motivation Behind the Attack<\/h1><div class=\"page\" title=\"Page 2\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<h2 class=\"column\"><strong style=\"font-size: large;\">\u00a0Transcript: Threat Actors<\/strong><\/h2>\n<\/div>\n<\/div>\n<\/div>\n<p><strong>00:00:12 Brandon Witte\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Hi everyone and welcome.\u00a0This is Brandon Witte.\u00a0I&#8217;m\u00a0the CEO of <a href=\"https:\/\/www.linkedin.com\/company\/sightlinesystems\/posts\/?feedView=all\">Sightline Systems<\/a> and\u00a0I&#8217;ve\u00a0got Brian Dixon, security architect at Unisys Corporation, as the Co.\u00a0Host this session,\u00a0we&#8217;re\u00a0going to talk about the threat actors and motivation behind\u00a0cyber attacks, and\u00a0we&#8217;re\u00a0excited to have with us.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Cyber security expert Damien Apone, the global Security program director at Genuine Parts Company.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So\u00a0Damian over the past several years,\u00a0we&#8217;ve\u00a0seen a staggering increase in the number of ransomware and\u00a0cyber attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:00:46\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah, so\u00a0as a matter of fact\u00a0you know. Looking back, you know latest statistics show that every 39 seconds\u00a0there&#8217;s\u00a0a new attack somewhere on the web.\u00a0The amount of damage is being done by cybercriminals has doubled from 2015 from\u00a0$3 trillion.\u00a0That\u2019s\u00a0over\u00a0$6 trillion\u00a0annually just\u00a0In\u00a0damage being\u00a0done\u00a0by\u00a0ransomware alone. The attacks have increased over 150% since 2020, so the attacks are certainly on the rise across the globe.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:01:20\u00a0Brandon Witte\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">And guys, it seems like as you said, every day\u00a0we&#8217;re\u00a0hearing about another company falling victim to\u00a0some kind of\u00a0cyber\u00a0attack.\u00a0And Brian,\u00a0It\u00a0just seems like this problem is going to\u00a0continue to get worse.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:01:31\u00a0Brian Dixon<\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">I completely agree just being in the cyber security field.\u00a0Past few years,\u00a0we&#8217;ve\u00a0seen customers trying to deal with and struggle dealing with some of the attacks that\u00a0they&#8217;ve\u00a0been facing over the last few years.\u00a0But especially with COVID last year and still ongoing people working remote data centers no longer being in one location.\u00a0Everything kind of being fluid in the cloud and multi cloud.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We&#8217;re just seeing a lot of advanced stage threat actor attacks that a lot of the legacy tools and things that customers have been doing are no longer really effective. So we&#8217;re seeing this.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">This obviously is a big issue, so\u00a0it\u00a0can get worse.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Like you said, Damien,\u00a0who&#8217;s\u00a0behind these attacks in your opinion and who really are the threat actors trying to gain access?\u00a0Yeah, so\u00a0I think you\u00a0know cyber security.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:02:11\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">In general, it\u00a0is\u00a0mystifying\u00a0to a lot of companies,\u00a0there&#8217;s\u00a0still a lot of denial of that.\u00a0I&#8217;m\u00a0not really a target.\u00a0I&#8217;m\u00a0not really.\u00a0There&#8217;s\u00a0no threat to me.\u00a0Typically\u00a0when we look\u00a0at the threat actor landscape and so\u00a0some will say they break it into five categories, some six.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So\u00a0the number of categories that they break it seem to vary, but at the bottom line, for me\u00a0it&#8217;s\u00a0really three\u00a0different types\u00a0of groups.\u00a0One are the nation state actors themselves and\u00a0we&#8217;re\u00a0familiar\u00a0with this as you know.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Their goal is to steal\u00a0secrets\u00a0right?\u00a0And\u00a0their\u00a0chief goal is\u00a0espionage threat.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It could be chaos, economic destruction.\u00a0These\u00a0are things that\u00a0are\u00a0led by China by Russia by Iran.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And\u00a0and\u00a0so\u00a0they&#8217;re\u00a0state\u00a0sponsored.\u00a0The second group is really the hacktivist, if you will or the social group and their primary goal is just either exposing secrets or disrupting services that they perceive as being evil.\u00a0They\u00a0don&#8217;t\u00a0necessarily target\u00a0particular\u00a0companies,\u00a0but\u00a0\u00a0they&#8217;re\u00a0really more\u00a0those\u00a0fringe believers where a company like a wiki\u00a0leaks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For example, right,\u00a0they&#8217;re\u00a0trying to reveal evil in companies.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Sony Pictures was another one of those cases where they were trying to\u00a0do\u00a0that,\u00a0the activists were trying to influence.\u00a0And then really the third group, which is the biggest group, is the you know, cyber criminals themselves.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And really these are the ones that we hear over and over about.\u00a0These are the ones that are leading the ransomware attacks.\u00a0The data breaches and things like that,\u00a0&#8217;cause\u00a0really for them it&#8217;s all about money and there&#8217;s a lot of\u00a0different ways\u00a0to monetize on an attack.\u00a0But those are primarily the three that we see in the industry today.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:04:10\u00a0Brian Dixon\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">No, thanks for that.\u00a0That&#8217;s\u00a0very interesting\u00a0and you know, I like to think that\u00a0I&#8217;m\u00a0pretty smart\u00a0when it comes to understanding technology and software and especially security.\u00a0But it even baffles me still like, how do these organizations and these individuals learn how to do and\u00a0create these exploits and\u00a0actually get\u00a0into companies and take out data and do what they do?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:04:30\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Well,\u00a0it&#8217;s\u00a0really\u00a0interesting\u00a0that some of these companies, some of.\u00a0These individuals that do it.\u00a0They start\u00a0very young\u00a0and\u00a0I believe it\u00a0was Twitter.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There was a Twitter hack a couple\u00a0years\u00a0ago in Florida and the gentleman who did it was 17 years old, right?\u00a0So\u00a0some cases you know, young, younger people are getting interested in this in some cases with nation\u00a0states\u00a0they have a whole program dedicated to churning these out.\u00a0Even in some of the cyber criminals.\u00a0Some of what they do is not overly sophisticated.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The Nigerian Prince\u00a0scam, for example.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">There&#8217;s\u00a0a bunch of people and people still fall for the Nigerian Prince\u00a0scam.\u00a0To this day, anybody can write a\u00a0really bad\u00a0email, which\u00a0they&#8217;re\u00a0really bad\u00a0emails.\u00a0And you know they can\u00a0inject the malware so.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What we&#8217;re seeing is, well is a rise of this ransomware or cyber crime as a service. So talking about threat actors is important. <\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So\u00a0if you can do parts of the whole exfiltration, but\u00a0maybe not\u00a0other parts, you can buy the ability from somebody else too.\u00a0You\u00a0know, if\u00a0you\u00a0don&#8217;t, know how to escalate privileges, for example.\u00a0You can buy that as a\u00a0service on the dark web.\u00a0So\u00a0the ability in the fact that\u00a0they&#8217;ve\u00a0created services around that is really,\u00a0really scary.\u00a0So\u00a0just about anybody\u00a0who really wanted to be a cybercriminal has that ability today just by paying a\u00a0portion\u00a0of what you get for their service.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:05:56\u00a0Brandon Witte\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">That&#8217;s\u00a0really interesting, because if\u00a0they&#8217;re\u00a0able to do this and\u00a0and\u00a0so easily find these attacks to implement, what doesn&#8217;t that make it easier for us?\u00a0Or\u00a0shouldn&#8217;t\u00a0it be easy to catch them?\u00a0Or the ones that are making these things available?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:06:15\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah,\u00a0that&#8217;s\u00a0a great question, and\u00a0it&#8217;s\u00a0a great point.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So\u00a0the interesting thing when we start talking about specifically ransomware as an example, the\u00a0the\u00a0the\u00a0most active ransomware families that are out there, the dark sides of the world, and some of the others.\u00a0You can go out online.\u00a0Google top\u00a0ransomware attacks 2021 look at what their tools, techniques, and procedures are. They call MTTP it. There is an organization called Mitre\u00a0Emitree\u00a0that\u00a0basically maps\u00a0it, so we have the playbook for the bad guys of how they execute their attacks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We&#8217;re\u00a0just ignoring it, and so a lot of what\u00a0we&#8217;re\u00a0seeing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Can these threat actors be diminished?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Absolutely, it can be, and the other good news is\u00a0it&#8217;s\u00a0a lot of\u00a0it&#8217;s\u00a0publicly available, so we know what the most exploited vulnerabilities are.\u00a0We know the methods that they are, that\u00a0they&#8217;re\u00a0proliferating ransomware in a company.\u00a0The information is\u00a0there\u00a0I think.\u00a0We just need to\u00a0listen and\u00a0lookf\u00a0for it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:07:19\u00a0Brian Dixon\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">What, in your opinion, what do you think companies can do to help better protect themselves, not just from an attack, but from a successful attack?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:07:28\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah,\u00a0I think that you\u00a0know most often is the foundational stuff, right?\u00a0Do the basics first and then sometimes\u00a0you know\u00a0I&#8217;ve\u00a0gotten questions around all these\u00a0really complex\u00a0attacks and the truth of the matter is,\u00a0the attacks are not\u00a0complex,\u00a0they&#8217;re\u00a0really not.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And like I said, you can go online and most of the attacks are following the same vulnerabilities.\u00a0They&#8217;re\u00a0exploiting the same vulnerabilities\u00a0they&#8217;re\u00a0exploiting.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The same, you know, configuration mistakes, so\u00a0it&#8217;s\u00a0not\u00a0really complex.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">We just\u00a0don&#8217;t\u00a0do the basics exceptionally well, so you know, I think if we if you align to the minor attack framework again,\u00a0it&#8217;s\u00a0publicly available, it\u00a0is the bad\u00a0guys\u00a0playbook.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But make sure\u00a0you&#8217;re\u00a0doing the basics.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Things like you know your vulnerability, scanning and patching that you know today you know average patch time can be anywhere between 60 to\u00a0150 days\u00a0and, you know that it sounds good, but\u00a0it&#8217;s\u00a0that&#8217;s\u00a0just from the time that it patches available.\u00a0That&#8217;s\u00a0almost six months, so there are a lot of cases where today\u00a0you&#8217;ll\u00a0find companies that still have not Petya.\u00a0You know doing that?\u00a0Basic hygiene?\u00a0Getting rid of your end of life, making sure that you know you have segmentation in place.\u00a0Which is where\u00a0we&#8217;re\u00a0leveraging\u00a0Unisys specifically today is you know, the more you make it harder for the bad guy to get what they want.\u00a0The less\u00a0they&#8217;re\u00a0going to\u00a0to\u00a0deal with you, so the more difficult you make it.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">By making sure\u00a0you&#8217;ve\u00a0got good passwords by making sure that you can escalate privileges that your\u00a0your\u00a0don&#8217;t\u00a0have the vulnerabilities for them to exploit.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The other big\u00a0really key\u00a0area gets to be email.\u00a0Don&#8217;t\u00a0overlook.\u00a0Email right, can\u00a0cause a lot of these things.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\"> Email is a huge target for threat actors.<\/span><\/p>\n<p><strong>00:09:16\u00a0Brian Dixon\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">How does the attacker get in?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:09:18\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Right, the threat actors and attackers typically are getting in via email, whether it is a phishing email or a business email, compromise, and email is responsible for about 94% of all malware that&#8217;s being deployed in an organization. Once you get the malware in, then it&#8217;s off to the races for the bad guys and, quite honestly, they have no timetable, they are. They are exceptionally patient. Uhm, they will sit there as long as they&#8217;re undetected for as long as they want. I believe the average dwell time now is coming down, which is really good news. From an average perspective, but the average dwell time can range between 49 to 150 days. So I understand that.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">If I can live in your environment for up to six months, and\u00a0you&#8217;re\u00a0not patching for up to six months later.\u00a0There&#8217;s\u00a0a lot\u00a0of\u00a0bad things\u00a0that can be done so, by doing the basics by making sure\u00a0you&#8217;re\u00a0aligning and understanding how\u00a0they&#8217;re\u00a0going to attack\u00a0you and then then preparing your defenses to know that if there this\u00a0particular attack\u00a0is going to escalate privileges.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What can I do to prevent that from\u00a0happening then doing that?\u00a0That is the most practical advice to preventing some of that right so.\u00a0I would say that.\u00a0Security or compliance is\u00a0definitely not\u00a0a solution here.\u00a0I\u00a0I\u00a0know\u00a0there&#8217;s\u00a0a lot of people.\u00a0You know scratching their heads.\u00a0Or worrying about the Biden.\u00a0Security cyber security regulations just passed.\u00a0Uhm, what I would\u00a0say is\u00a0you know if\u00a0you&#8217;re\u00a0going to do compliance, you know compliance equals\u00a0minimum\u00a0requirements.\u00a0A lot of\u00a0times\u00a0it&#8217;s\u00a0the\u00a0check the box if you\u00a0if you do the right things from a security perspective,\u00a0you&#8217;re\u00a0going to achieve that compliance as a as\u00a0an end result, so I\u00a0wouldn&#8217;t\u00a0focus on how do I\u00a0comply with\u00a0the regulation,\u00a0as much as what\u00a0you\u00a0need to secure, because really, depending upon the attacker and the\u00a0nature.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What I see in my company, if\u00a0I&#8217;ve\u00a0experienced it in my company, is you know,\u00a0I&#8217;m\u00a0not a threat.\u00a0You know,\u00a0there&#8217;s\u00a0nobody a threat to us.\u00a0I\u00a0don&#8217;t\u00a0have what they want.\u00a0That&#8217;s\u00a0not true.\u00a0No one would want to attack me.\u00a0That&#8217;s\u00a0not true either.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So, so how they choose their targets gets to be\u00a0very, very interesting, right?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And it depends on the threat actor.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And sometimes it\u00a0isn&#8217;t\u00a0a\u00a0direct attack on you.\u00a0Right, sometimes you are the mule to somewhere\u00a0else the HVAC company that was\u00a0leveraged\u00a0to get into target for it, for instance.\u00a0But understanding why they attack, so you know, nation\u00a0states\u00a0they&#8217;re\u00a0after government secrets.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They&#8217;re\u00a0there to create chaos again.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Activists, they have their own their own things so.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But the nation state you know who are they targeting with these threat actors? They&#8217;re targeting businesses as well as government run organizations well, I&#8217;m not a government run organization, no, but do we do business with the government?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Are we taking a posture on something and\u00a0I think you\u00a0know,\u00a0we&#8217;ve\u00a0seen that over the past summer where with a lot of social issues coming up here in the United States that certain companies that may stand against those social beliefs are\u00a0being targeted\u00a0and\u00a0then really do\u00a0I make money?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Am I perceived to be cash or data rich?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">For me I\u00a0work in a Fortune 200 company.\u00a0That&#8217;s\u00a0a lot of money that we make, so the bad guys look at us as a target and say\u00a0you&#8217;ve\u00a0got a lot of money.\u00a0I may\u00a0not have the data, but\u00a0if they feel that they can get the money\u00a0out of us one way or another, either through ransomware or through a data breach then\u00a0that&#8217;s\u00a0their motivation to attack so, and you know the interesting thing is, some companies face a threat from all three categories.\u00a0And they may not.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The\u00a0really interesting\u00a0thing about the colonial pipeline incident was dark side.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The ransomware group that attacked\u00a0Colonial\u00a0pipeline after it happened.\u00a0They were very, very quick to point out.\u00a0Hey, this is not politically motivated.\u00a0This is not a political statement.\u00a0All we want is the money, right?\u00a0Because they are a key.\u00a0Component\u00a0to the infrastructure you know, jabs the same thing, right?\u00a0They&#8217;re\u00a0a key\u00a0component\u00a0to the infrastructure in terms of a meat packing.\u00a0We just packed meat.\u00a0Why would anybody want\u00a0to attack us?\u00a0Because they were perceived to\u00a0have deep pockets and would pay the rent.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Gets to be interesting as well, unfortunately, as\u00a0we&#8217;ve\u00a0seen other events, especially around critical infrastructure, occur that were not necessarily related to cyber.\u00a0But should cause alarm and concern right folks can remember earlier this year in Texas when the power grid went out.\u00a0Right, that was.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Not necessarily done because of a cyberattack.\u00a0But it shows.\u00a0If they could do it, the impact that that could have the impact of, you know, just breaching an accounting system at\u00a0Colonial\u00a0pipeline.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What does that?\u00a0What effect does that have?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So\u00a0if\u00a0you&#8217;ve\u00a0got data that can be monetized on the dark\u00a0web, if\u00a0you&#8217;ve\u00a0got or perceived to have deep pockets.\u00a0Or dealing in some of these.\u00a0Things you can be a threat on multiple\u00a0levels,\u00a0it&#8217;s\u00a0a lot.\u00a0It&#8217;s\u00a0crazy to see the\u00a0success these\u00a0people are having against organizations and the money that\u00a0they&#8217;re\u00a0actually trading\u00a0to meet there.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:14:50\u00a0Brian Dixon\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">I guess the last thing I want to ask and then\u00a0I&#8217;ll\u00a0hand it back to Brandon.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">What is your opinion on companies?\u00a0Some of the recent data breaches and attacks that\u00a0we&#8217;ve\u00a0seen.\u00a0They&#8217;ve\u00a0paid\u00a0ransom\u00a0right?\u00a0So\u00a0they&#8217;ve\u00a0done that\u00a0in an effort to\u00a0think that\u00a0they&#8217;re\u00a0going to get their data back.\u00a0Have you seen any situations where\u00a0they&#8217;ve\u00a0been\u00a0maybe attacked\u00a0again through that that exchange of paying that ransom?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:15:10\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah, there&#8217;s a couple of trends that are going on, so the first one as you mentioned was follow on attacks and\u00a0and\u00a0so we are certainly seeing that.\u00a0Probably not\u00a0as rampant because I think where people are learning the first\u00a0time, if\u00a0you pay the ransom.\u00a0Some of the ransomware, like I said, Dark side, is the ransomware group with the heart.\u00a0They say\u00a0won&#8217;t\u00a0attack hospitals.\u00a0They\u00a0won&#8217;t\u00a0attack educational groups, but not all or that way.\u00a0Not all have that morality.\u00a0Some will say hey, if you pay the ransom the first\u00a0time\u00a0I&#8217;m going to attack you again,\u00a0&#8217;cause\u00a0you probably haven&#8217;t fixed the problems, so I&#8217;m going to charge\u00a0you double the\u00a0ransom, so we do see that occurring.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">The other trend that\u00a0we&#8217;re\u00a0actually starting\u00a0to see on the rise right now is kind of a double ransom that\u00a0they&#8217;re\u00a0calling it.\u00a0Where\u00a0I&#8217;m\u00a0going to hold your files and help you pay the ransom and then sometimes you may get your files unencrypted.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">You may not, they&#8217;ll give you the key. If you pay, they will give you the key to unlock. Now, whether or not it actually works. That may be something totally different with these threat actors. But what they&#8217;re also doing is they&#8217;re saying, hey, I&#8217;m gonna. I&#8217;ve ransomware on your stuff. We&#8217;ve stolen your data, and if you don&#8217;t pay me this other ransom, I&#8217;m going to expose that as well, so they&#8217;re kind of doing it 2 for one, where they&#8217;re locking you up and taking your data, and basically, you know, extorting you to. To not leak the fact that they&#8217;ve done that. And a lot of that is because of those dwell times, because if they, if I can live in the environment, they&#8217;re exceptionally patient.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">They&#8217;ll\u00a0sit there for months on end and just learn your business, and\u00a0they&#8217;ll\u00a0imitate the people that they need to imitate.\u00a0Or they will\u00a0proliferate\u00a0whatever they want to do.\u00a0Uhm, there is some\u00a0some\u00a0debate around the dwell time of why\u00a0it&#8217;s\u00a0come down, and I think the why\u00a0it&#8217;s\u00a0come down\u00a0there&#8217;s\u00a0a camp.\u00a0That will say.\u00a0It&#8217;s\u00a0coming down because the actors are acting quicker, especially\u00a0in light of\u00a0ransomware, right?\u00a0So\u00a0the threat actor gets in.\u00a0They\u00a0don&#8217;t\u00a0need as long to figure out how to lock everything up.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So that dwell time,\u00a0how\u00a0long are they in my environment, is going down artificially\u00a0because\u00a0they&#8217;re\u00a0acting sooner than they have in the past.\u00a0But\u00a0yeah, just because\u00a0you pay a ransom and the other key thing around ransomware.\u00a0A lot of companies are\u00a0purchasing\u00a0cyber security insurance right now.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Premiums are on the rise dramatically 100 and 5200%. If you can get the cyber insurance coverage, there is a lot of focus right now around ransomware as well, because the insurance companies are\u00a0are\u00a0really.\u00a0We getting a lot of claims in that\u00a0particular area\u00a0what I would\u00a0advise\u00a0people is check your check your policy, check the conditions of your policy because in some cases if you\u00a0actually pay\u00a0the\u00a0ransom\u00a0it may negate your insurance coverage.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">So there\u00a0there&#8217;s\u00a0a lot of things\u00a0that companies may or may not do.\u00a0Hey, just pay the ransom and\u00a0they&#8217;ll\u00a0go away.\u00a0You are set up.\u00a0If\u00a0you&#8217;re\u00a0going to do that, great.\u00a0Fix yourself so it\u00a0doesn&#8217;t\u00a0happen again.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">But also make sure that if you do have ransomware insurance or cyber insurance, you\u00a0read the policy and know\u00a0what the provisions around ransomware are.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:18:29\u00a0Brian Dixon\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Wow\u00a0yeah, thanks for that information.\u00a0It&#8217;s\u00a0super helpful to know.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Back to you, Brandon.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:18:34\u00a0Brandon Witte\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah, and one last question on this is that so someone\u00a0that&#8217;s\u00a0been compromised and the data has been taken and I\u00a0pay my ransom,\u00a0they give me my key.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Is it fair to say that\u00a0they&#8217;ve\u00a0also\u00a0opened up\u00a0a whole another set of potential vulnerabilities so that you know, as you said, they can just come back again\u00a0the second or third time, even easier than the 1st.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:18:59\u00a0Damian Apone\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">Yeah, I think so once the\u00a0company gets breached in a lot\u00a0of times, the others have their data breach reports.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">I think what\u00a0happens is after the containment right, did we it did?\u00a0That&#8217;s\u00a0when the handwringing comes in the teeth, gnashing, come into place.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">How did they get it?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">It&#8217;s\u00a0important to go through that payment to be honest, to say well how did they get in?\u00a0How could this have been proved?\u00a0Again, how do we stop\u00a0from even getting there, right?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let&#8217;s\u00a0do the basics.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Let&#8217;s\u00a0do those core responsibilities of patching\u00a0and scanning and fixing.\u00a0The more of that you do that takes out\u00a0a\u00a0lot of 80%.\u00a0Really, if you just patch vulnerabilities, if you have good email controls in terms of blocking phishing, the more opportunities you can take away from the bad guy, the better off\u00a0you&#8217;re\u00a0going to be, and I think that hindsight that Monday morning quarterbacking of gosh, how did this happen?\u00a0You know\u00a0it&#8217;s\u00a0almost better\u00a0to do that now and simulate that through a table top.\u00a0And hey, we failed the table top, but\u00a0that&#8217;s\u00a0OK.\u00a0What can we do to better protect it?\u00a0It will highlight things.\u00a0It will highlight\u00a0alot\u00a0of things.\u00a0That\u00a0maybe you\u00a0have a lot of technical debt, a lot of companies have technical debt.\u00a0But the other thing here is that I\u00a0want to highlight is\u00a0it&#8217;s\u00a0not all about the technology.\u00a0And really to be\u00a0really protective\u00a0from a security perspective, don&#8217;t\u00a0just look at, did I fix a vulnerability or why do we have an old system out there?\u00a0It&#8217;s\u00a0all about people,\u00a0process\u00a0and technology.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Do I have the right people?\u00a0Are they looking at the right\u00a0things,\u00a0because\u00a0the human configures\u00a0technology, so maybe we\u00a0didn&#8217;t\u00a0configure something correctly. Do I have the right processes in place that if something is found that\u00a0we&#8217;re\u00a0notified so a lot of times\u00a0there&#8217;s\u00a0a lot of money,\u00a0it&#8217;s\u00a0probably a\u00a0$300 billion\u00a0industry in terms of cyber security software,\u00a0it&#8217;s\u00a0not necessarily technology failures that.\u00a0We have\u00a0people.\u00a0We have process failures that been manifested on the technology side.\u00a0So\u00a0you know, are we checking the\u00a0firewall\u00a0rules?\u00a0Are we reviewing who has access into the system?<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Those\u00a0aren&#8217;t\u00a0technology things, those are.\u00a0Those are people in\u00a0the\u00a0process.\u00a0So\u00a0I think it&#8217;s important to do that\u00a0&#8217;cause\u00a0it will highlight and you got hit once.\u00a0Every actor does something\u00a0different, which is why if you go\u00a0out and look and\u00a0say.\u00a0Oh, how are the most common things happening?\u00a0There&#8217;s\u00a0567 different paths that they may go.\u00a0Through so\u00a0don&#8217;t\u00a0just\u00a0check the one path where you got\u00a0got.\u00a0If you will check the other six as\u00a0well\u00a0right?\u00a0The more that you can prepare and know, and if you find things.\u00a0That&#8217;s\u00a0OK, you want to.\u00a0Find it before the bad guys do and then fix it.\u00a0&#8216;Cause\u00a0if you fix those things, they&#8217;re just\u00a0going to say hey, you know what?\u00a0It&#8217;s\u00a0not worth my time.\u00a0I&#8217;m\u00a0just going to move on and\u00a0find somebody\u00a0else\u00a0who&#8217;s\u00a0not as well protected.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><strong>00:21:51\u00a0Brandon Witte\u00a0<\/strong><\/p>\n<p><span data-contrast=\"auto\">So thanks so much guys. We&#8217;re out of time for today, but I want to thank Damian great stuff there on your insight and background on the space. Really appreciate our talk on threat actors. Thank you.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">And Brian, thanks so much and join us next time as we dig in a little bit more on what we can do and the top things that can\u00a0can\u00a0be done to help better protect companies from the increase in attacks that\u00a0we&#8217;ve\u00a0been seeing.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Thanks so much.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":30,"featured_media":226224,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4149],"tags":[],"class_list":["post-226222","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sightline-videos"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Threat Actors and Motivation Behind the Attack | Sightline Systems<\/title>\n<meta name=\"description\" content=\"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Podcast: Threat Actors and the Motivation Behind the Attack\" \/>\n<meta property=\"og:description\" content=\"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\" \/>\n<meta property=\"og:site_name\" content=\"Sightline Systems: Monitoring and Analytics to Optimize Your Business\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sightlinesystem\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-12T20:49:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-17T20:48:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"857\" \/>\n\t<meta property=\"og:image:height\" content=\"471\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Brandon Witte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sightlinesystem\" \/>\n<meta name=\"twitter:site\" content=\"@sightlinesystem\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\"},\"author\":{\"name\":\"Brandon Witte\",\"@id\":\"https:\/\/www.sightline.com\/#\/schema\/person\/0c390a1013473189a5daedf986f54649\"},\"headline\":\"Podcast: Threat Actors and the Motivation Behind the Attack\",\"datePublished\":\"2021-11-12T20:49:36+00:00\",\"dateModified\":\"2026-02-17T20:48:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\"},\"wordCount\":3977,\"publisher\":{\"@id\":\"https:\/\/www.sightline.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png\",\"articleSection\":[\"Sightline Videos\"],\"inLanguage\":\"en-US\"},{\"@type\":[\"WebPage\",\"AboutPage\"],\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\",\"url\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\",\"name\":\"Threat Actors and Motivation Behind the Attack | Sightline Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.sightline.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png\",\"datePublished\":\"2021-11-12T20:49:36+00:00\",\"dateModified\":\"2026-02-17T20:48:07+00:00\",\"description\":\"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage\",\"url\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png\",\"contentUrl\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png\",\"width\":857,\"height\":471,\"caption\":\"podcast motivation behind cyber attacks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sightline.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Podcast: Threat Actors and the Motivation Behind the Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sightline.com\/#website\",\"url\":\"https:\/\/www.sightline.com\/\",\"name\":\"Sightline Systems: Monitoring and Analytics to Optimize Your Business\",\"description\":\"IT and IIoT Infrastructure Monitoring Software for Servers and Applications - Sightline Systems\",\"publisher\":{\"@id\":\"https:\/\/www.sightline.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sightline.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sightline.com\/#organization\",\"name\":\"Sightline Systems\",\"url\":\"https:\/\/www.sightline.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sightline.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/2015\/05\/google-app-sightline-logo.png\",\"contentUrl\":\"https:\/\/www.sightline.com\/wp-content\/uploads\/2015\/05\/google-app-sightline-logo.png\",\"width\":320,\"height\":132,\"caption\":\"Sightline Systems\"},\"image\":{\"@id\":\"https:\/\/www.sightline.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sightlinesystem\/\",\"https:\/\/x.com\/sightlinesystem\",\"https:\/\/www.linkedin.com\/company\/sightlinesystems\",\"https:\/\/www.youtube.com\/channel\/UC9ELvdtZWL5PbYlA7vCk8yA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sightline.com\/#\/schema\/person\/0c390a1013473189a5daedf986f54649\",\"name\":\"Brandon Witte\",\"description\":\"Brandon Witte is the CEO of Sightline Systems, a global leader in real-time performance monitoring and analytics software. With nearly two decades at the helm of Sightline, Brandon has driven innovation across industries, recently expanding into aquaculture with the launch of AQUA Sightline. An experienced executive with a Bachelor of Science in Management Science from Virginia Tech\u2019s Pamplin College of Business, Brandon\u2019s career spans expertise in enterprise software, IT strategy, and professional services. Under Brandon\u2019s leadership, Sightline has established a reputation for delivering actionable insights through advanced analytics, empowering businesses to optimize operations for higher profit margins and more successful day-to-day operations.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Threat Actors and Motivation Behind the Attack | Sightline Systems","description":"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/","og_locale":"en_US","og_type":"article","og_title":"Podcast: Threat Actors and the Motivation Behind the Attack","og_description":"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.","og_url":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/","og_site_name":"Sightline Systems: Monitoring and Analytics to Optimize Your Business","article_publisher":"https:\/\/www.facebook.com\/sightlinesystem\/","article_published_time":"2021-11-12T20:49:36+00:00","article_modified_time":"2026-02-17T20:48:07+00:00","og_image":[{"width":857,"height":471,"url":"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png","type":"image\/png"}],"author":"Brandon Witte","twitter_card":"summary_large_image","twitter_creator":"@sightlinesystem","twitter_site":"@sightlinesystem","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#article","isPartOf":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/"},"author":{"name":"Brandon Witte","@id":"https:\/\/www.sightline.com\/#\/schema\/person\/0c390a1013473189a5daedf986f54649"},"headline":"Podcast: Threat Actors and the Motivation Behind the Attack","datePublished":"2021-11-12T20:49:36+00:00","dateModified":"2026-02-17T20:48:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/"},"wordCount":3977,"publisher":{"@id":"https:\/\/www.sightline.com\/#organization"},"image":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png","articleSection":["Sightline Videos"],"inLanguage":"en-US"},{"@type":["WebPage","AboutPage"],"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/","url":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/","name":"Threat Actors and Motivation Behind the Attack | Sightline Systems","isPartOf":{"@id":"https:\/\/www.sightline.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage"},"image":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png","datePublished":"2021-11-12T20:49:36+00:00","dateModified":"2026-02-17T20:48:07+00:00","description":"- Podcast: Threat Actors and the Motivation Behind the Attack In this podcast, we discuss threat actors.","breadcrumb":{"@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#primaryimage","url":"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png","contentUrl":"https:\/\/www.sightline.com\/wp-content\/uploads\/Threat-Actors-and-the-Motivation-Behind-the-Attack.png","width":857,"height":471,"caption":"podcast motivation behind cyber attacks"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sightline.com\/podcast-threat-actors-and-the-motivation-behind-the-attack\/sightline-videos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sightline.com\/"},{"@type":"ListItem","position":2,"name":"Podcast: Threat Actors and the Motivation Behind the Attack"}]},{"@type":"WebSite","@id":"https:\/\/www.sightline.com\/#website","url":"https:\/\/www.sightline.com\/","name":"Sightline Systems: Monitoring and Analytics to Optimize Your Business","description":"IT and IIoT Infrastructure Monitoring Software for Servers and Applications - Sightline Systems","publisher":{"@id":"https:\/\/www.sightline.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sightline.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sightline.com\/#organization","name":"Sightline Systems","url":"https:\/\/www.sightline.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sightline.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.sightline.com\/wp-content\/uploads\/2015\/05\/google-app-sightline-logo.png","contentUrl":"https:\/\/www.sightline.com\/wp-content\/uploads\/2015\/05\/google-app-sightline-logo.png","width":320,"height":132,"caption":"Sightline Systems"},"image":{"@id":"https:\/\/www.sightline.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sightlinesystem\/","https:\/\/x.com\/sightlinesystem","https:\/\/www.linkedin.com\/company\/sightlinesystems","https:\/\/www.youtube.com\/channel\/UC9ELvdtZWL5PbYlA7vCk8yA"]},{"@type":"Person","@id":"https:\/\/www.sightline.com\/#\/schema\/person\/0c390a1013473189a5daedf986f54649","name":"Brandon Witte","description":"Brandon Witte is the CEO of Sightline Systems, a global leader in real-time performance monitoring and analytics software. With nearly two decades at the helm of Sightline, Brandon has driven innovation across industries, recently expanding into aquaculture with the launch of AQUA Sightline. An experienced executive with a Bachelor of Science in Management Science from Virginia Tech\u2019s Pamplin College of Business, Brandon\u2019s career spans expertise in enterprise software, IT strategy, and professional services. Under Brandon\u2019s leadership, Sightline has established a reputation for delivering actionable insights through advanced analytics, empowering businesses to optimize operations for higher profit margins and more successful day-to-day operations."}]}},"_links":{"self":[{"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/posts\/226222","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/users\/30"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/comments?post=226222"}],"version-history":[{"count":1,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/posts\/226222\/revisions"}],"predecessor-version":[{"id":233177,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/posts\/226222\/revisions\/233177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/media\/226224"}],"wp:attachment":[{"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/media?parent=226222"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/categories?post=226222"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sightline.com\/wp-json\/wp\/v2\/tags?post=226222"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}