Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1145

Threat Actor

What is Threat Actor?

Threat ActorAn individual or group that intentionally causes or attempts to cause harm to information systems, organisations, or people through cyber operations.


Threat actor is the umbrella term used by threat-intelligence and incident-response teams to describe any adversary observed in cyber operations. Categories include nation-state actors, organised cybercrime groups, hacktivists, insiders, terrorist organisations, lone-wolf attackers, and script kiddies. Each is profiled by motivation (espionage, financial gain, disruption, ideology), capability, sophistication, infrastructure, and TTPs mapped to MITRE ATT&CK. Vendors track them under their own naming schemes, such as APT, FIN, UNC, GROUP-IB, Mandiant temp names, CrowdStrike spider/panda/bear themes, Microsoft weather names, and Recorded Future TAGs. Understanding actor profiles informs detection priorities, intelligence requirements, and defensive controls.

Examples

  1. 01

    A nation-state actor running long-term espionage against defence contractors.

  2. 02

    A ransomware affiliate buying initial access from a broker to deploy LockBit on a manufacturer.

Frequently asked questions

What is Threat Actor?

An individual or group that intentionally causes or attempts to cause harm to information systems, organisations, or people through cyber operations. It belongs to the Defense & Operations category of cybersecurity.

What does Threat Actor mean?

An individual or group that intentionally causes or attempts to cause harm to information systems, organisations, or people through cyber operations.

How does Threat Actor work?

Threat actor is the umbrella term used by threat-intelligence and incident-response teams to describe any adversary observed in cyber operations. Categories include nation-state actors, organised cybercrime groups, hacktivists, insiders, terrorist organisations, lone-wolf attackers, and script kiddies. Each is profiled by motivation (espionage, financial gain, disruption, ideology), capability, sophistication, infrastructure, and TTPs mapped to MITRE ATT&CK. Vendors track them under their own naming schemes, such as APT, FIN, UNC, GROUP-IB, Mandiant temp names, CrowdStrike spider/panda/bear themes, Microsoft weather names, and Recorded Future TAGs. Understanding actor profiles informs detection priorities, intelligence requirements, and defensive controls.

How do you defend against Threat Actor?

Defences for Threat Actor typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Threat Actor?

Common alternative names include: Adversary, Cyber threat actor.

Related terms

See also