Search
Browse By Day
Browse By Time
Browse By Person
Browse By Area
Browse By Session Type
Search Tips
ASC Home
Sign In
X (Twitter)
The rising sophistication and frequency of cyber incidents raise concerns about distinguishing state-sponsored from non-state cyber actors. While state actors pursue geopolitical, economic, or intelligence objectives, non-state actors—including cybercriminals and hacktivists—operate for financial, ideological, or disruptive reasons. However, attribution remains challenging. Guided by environmental criminology frameworks, this study examines targeting patterns, operational strategies, and decision-making processes of these actors to determine whether distinct signatures exist. Using secondary data from the European Repository of Cyber Incidents (EuRepoC), it quantitatively analyzes correlations between actor type, target selection, and attack methods. Findings seek to inform a framework to enhance cyber threat attribution and support policymakers, cybersecurity professionals, and intelligence analysts.