Cyber Threat: Compromise of accounts for espionage

A cyber adversary gains access to user accounts / services for espionage purposes

More attack types.

attack-type

Compromise of accounts for espionage

A cyber adversary gains access to user accounts / services for espionage purposes.

attack-type

Theft of data for financial gain

An attacker steals data in order to extort the victim or sell it on.

attack-type

Disk wiping or encryption for disruption

An attacker wipes disks or deploys encryption against target computers solely for disruptive or destructive purposes.

attack-type

Denial of service to disrupt

A denial of service attack which disrupts the victim's operations.

attack-type

Exploitation for future access

Exploitation of vulnerabilities in order to obtain initial access to victims for potential future use - such as strategic compromise or onward sale.

attack-type

Hack and leak for infamy

Attacking an organisation or individual and publishing details or data for infamy or personal pride.