A cyber adversary gains access to user accounts / services for espionage purposes
A cyber adversary gains access to user accounts / services for espionage purposes.
An attacker steals data in order to extort the victim or sell it on.
An attacker wipes disks or deploys encryption against target computers solely for disruptive or destructive purposes.
A denial of service attack which disrupts the victim's operations.
Exploitation of vulnerabilities in order to obtain initial access to victims for potential future use - such as strategic compromise or onward sale.
Attacking an organisation or individual and publishing details or data for infamy or personal pride.