An attacker steals data in order to extort the victim or sell it on.
attack-type
A cyber adversary gains access to user accounts / services for espionage purposes.
An attacker wipes disks or deploys encryption against target computers solely for disruptive or destructive purposes.
A denial of service attack which disrupts the victim's operations.
Exploitation of vulnerabilities in order to obtain initial access to victims for potential future use - such as strategic compromise or onward sale.
Attacking an organisation or individual and publishing details or data for infamy or personal pride.