

They could be taking such action as a way to get revenge for acts taken against them. Still, other attacks aim to gain valuable corporate data, such as propriety information these types of cyber attacks are a modern, computerized form of corporate espionage.ĭisruption and revenge. Bad actors also launch attacks specifically to sow chaos, confusion, discontent, frustration or mistrust. Other financially motivated attacks are designed to disable computer systems, with cybercriminals locking computers so owners and authorized users cannot access the applications or data they need attackers then demand that the targeted organizations pay them ransoms to unlock the computer systems. These attacks often aim to steal sensitive data, such as customer credit card numbers or employee personal information, which the cybercriminals then use to access money or goods using the victims' identities. They can have various objectives, including the following:įinancial gain. Cybercriminals launch most cyber attacks, especially those against commercial entities, for financial gain. Why do cyber attacks happen?Ĭyber attacks are designed to cause damage. They're identified as nation-state attackers, and they have been accused of attacking the information technology (IT) infrastructure of other governments, as well as nongovernment entities, such as businesses, nonprofits and utilities. Government-sponsored groups of computer experts also launch cyber attacks. They can also belong to a criminal syndicate, working with other threat actors to find weaknesses or problems in the computer systems - called vulnerabilities - that they can exploit for criminal gain.

Often referred to as bad actors, threat actors and hackers, they include individuals who act alone, drawing on their computer skills to design and execute malicious attacks. People who carry out cyber attacks are generally regarded as cybercriminals. Cyber attacks aim to disable, disrupt, destroy or control computer systems or to alter, block, delete, manipulate or steal the data held within these systems.Īny individual or group can launch a cyber attack from anywhere by using one or more various attack strategies. A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.
