During an investigation, security analysts discover that a threat actor compromised an e-commerce server, copied thousands of customer credit card records, and then advertised the data for sale on a dark-web marketplace. Which primary motivation best matches this attacker's actions?
Selling or using stolen credit-card details is a classic example of a financially motivated attack. The attacker's goal is to convert the data into money, either directly through fraudulent purchases or by reselling the card numbers. Espionage seeks strategic or state secrets, revenge is driven by personal grievance, and philosophical or political motivations aim to make a statement rather than earn profit-none of which fits the described behavior.
Ask Bash
Bash is our AI bot, trained to help you pass your exam. AI Generated Content may display inaccurate information, always double-check anything important.
What is the difference between financial gain and data exfiltration in a cyberattack?
Open an interactive chat with Bash
How do attackers monetize stolen credit card information?
Open an interactive chat with Bash
How is espionage different from other cyberattack motivations like financial gain?