Skip to main content

๐ŸŽฏ Actions on Objectives

After initial access, privilege escalation, and lateral movement, an adversary transitions to their true goalโ€”called Actions on Objectives.

This phase reflects the "why" behind an operation. Itโ€™s when an attacker acts on the intended mission objectives, which vary based on motivation, funding, and opportunity.


๐Ÿงญ Goals and Motivationsโ€‹

Cyberattacks serve a wide spectrum of purposes. Below are the most common strategic objectives grouped by intent:


๐Ÿฆ 1. Financial Gainโ€‹

MethodExample Use Cases
๐Ÿ’ฐ Direct TheftWire fraud, draining wallets, siphoning bank accounts
๐Ÿ’ธ RansomwareEncrypting data and demanding payment for recovery
๐Ÿ›๏ธ FraudSelling stolen credit card or PII data
๐Ÿงฎ CryptojackingCovert crypto mining on compromised systems

๐Ÿ•ต๏ธ 2. Espionageโ€‹

MethodExample Use Cases
๐Ÿข Corporate EspionageStealing proprietary source code, M&A docs
๐Ÿ›ฐ๏ธ State-Sponsored OpsSurveillance of foreign agencies or adversaries
โš™๏ธ Industrial EspionageCompromising ICS/SCADA for economic advantage

โšก 3. Disruptionโ€‹

MethodImpact
๐ŸŒ DDoS AttacksTaking down websites or services
โš ๏ธ Critical Infra HitsDisrupting power, transit, or healthcare
๐Ÿงจ Data CorruptionCausing operational failure

๐Ÿงพ 4. Data Theftโ€‹

Data TargetedUse
๐Ÿ‘ค Personal Info (PII)Identity theft, doxxing, resale
๐Ÿ” CredentialsEnable lateral movement, resale
๐Ÿงพ Corporate RecordsCompetitive intelligence, leaks

โœŠ 5. Political or Ideological Goalsโ€‹

TacticObjective
๐Ÿ–ผ๏ธ Website DefacementMaking a public statement
๐Ÿ—ฃ๏ธ Info WarfareDisinformation, propaganda, election meddling
๐Ÿ”“ WhistleblowingLeaking corporate/government misdeeds

๐Ÿ’ฅ 6. Destruction or Manipulationโ€‹

GoalExample
๐Ÿ’ฃ Data WipingMalware like NotPetya targeting disks
๐Ÿงช Data TamperingAltering financial or sensor data

๐Ÿ› ๏ธ 7. Infrastructure Accessโ€‹

MechanismPurpose
๐Ÿช Backdoor CreationPersistent access for later operations
โ†”๏ธ PivotingMove deeper into the environment
๐Ÿค– Botnet EnlistmentFuture DDoS, spam, or proxy use

๐Ÿงผ 8. Reputation Damageโ€‹

MethodImpact
๐Ÿ–๏ธ DefacementUndermines public trust
๐Ÿช“ LeaksEmbarrassment, PR crises
๐ŸŽญ Social EngManipulating internal stakeholders

๐Ÿช– 9. Military or National Securityโ€‹

GoalDescription
๐Ÿ”ฅ Cyber WarfareCripple enemy systems
๐Ÿ›ฐ๏ธ SurveillanceMonitor adversaries
๐Ÿ’€ Capability DisruptionDisable defense, comms, logistics

๐Ÿงช 10. Capability Testingโ€‹

PurposeExamples
๐Ÿ”ง PoC ExploitsShowcasing 0-day effectiveness
๐Ÿง‘โ€๐Ÿ’ป RecruitmentImpressing threat actors
๐ŸŽฎ Cyber Range GamesPracticing in the real world

๐Ÿ” 11. Extortion & Coercionโ€‹

MechanismApplication
๐Ÿงจ BlackmailWith leaked photos, chats, emails, or data
๐Ÿค CoercionForcing execs or officials into compliance

๐Ÿ—ณ๏ธ 12. Influence Operationsโ€‹

TacticTarget
๐Ÿฆ Social Media HacksControlling narrative or speech
๐Ÿ—ณ๏ธ Election InterferenceTampering, discrediting institutions

๐Ÿง  The Takeawayโ€‹

Understanding Actions on Objectives helps defenders:

  • Prioritize post-compromise detection
  • Monitor exfil and data manipulation patterns
  • Tag alerts with intent (espionage vs disruption)

๐Ÿ”„ Initial access is just the door. The real damage happens during Actions on Objectives.