Preventions
- Home
- - Preventions
- -PV059
- ID: PV059
- Created: 21st May 2025
- Updated: 21st May 2025
- Contributor: Ryan Bellows
Insider-Focused Threat Intelligence
Threat intelligence feeds that include indicators of insider tactics—rather than just malware or phishing IoCs—can inform policy decisions, access design, and targeted monitoring. These feeds allow organizations to anticipate adversarial interest in recruiting, coercing, or planting insiders, and to mitigate the tools and behaviors those insiders are likely to use.
Prevention Measures:
Subscribe to threat intelligence services that provide curated insider threat profiles, including:
- Recruitment patterns used by foreign intelligence services.
- Behavioral precursors to sabotage, data theft, or access misuse.
- Indicators from anonymized insider case disclosures (e.g., DFIR reports, industry reporting, national CERTs).
Use these feeds to inform:
- DLP tuning based on exfiltration paths observed in real incidents.
- Risk-based access policies that factor in job function, department, or geographic anomaly exposure.
- Targeted internal education on known techniques (e.g., false flag account creation, side-channel messaging, Git repo exfiltration).
Examples of Insider-Focused TI Sources:
Sections
ID | Name | Description |
---|---|---|
MT017 | Espionage | A subject carries out covert actions, such as the collection of confidential or classified information, for the strategic advantage of a nation-state. |
MT017.001 | Nation-State Alignment | The subject is a current or former asset of a nation-state intelligence service, operating inside the organization with pre-existing loyalty to, or direct affiliation with, a foreign government. Unlike insiders who develop espionage motives post-employment, this subject is often inserted, recruited prior to hiring, or cultivated externally over time and then encouraged to seek access to a target organization.
Their motive is the advancement of strategic objectives on behalf of a foreign nation-state. These objectives may include extracting sensitive information, degrading operational resilience, manipulating internal systems or decisions, weakening public or partner trust, or embedding long-term access for future exploitation. Such subjects may be formal intelligence officers, contract operatives, ideological affiliates, or individuals acting under recruitment, coercion, or influence.
Example Scenarios:
|
MT005.002 | Corporate Espionage | A third party private organization deploys an individual to a target organization to covertly steal confidential or classified information or gain strategic access for its own benefit. |
MT005.001 | Speculative Corporate Espionage | A subject covertly collects confidential or classified information, or gains access, with the intent to sell it to a third party private organization. |