A cybercriminal gains access to sensitive internal documents revealing a company's illegal activities and threatens to release them unless the company complies with their demands. What is the attacker's primary motivation in this scenario?
Revenge
Sabotage
Blackmail
Espionage