A penetration tester is planning to conduct a distributed dictionary attack on a government domain against the login portal.
The tester will leverage multiple proxies to mask the origin IPs of the attack. Which of the following threat actors will be emulated?
A. APT
B. Hacktivist
C. Script kiddie
D. Insider threat