Hack and Leak: Cyber attacks meet information influence operations
Summary
The Hack and Leak phenomenon combines cyber attacks with information influence activities. Attackers breach targets, steal critical information, then utilize it against the victim. This represents a hybrid attack approach.
Key Details
- Phenomenon: Hack and Leak
- Method: Data breach → theft → exploitation/publication
- Classification: Hybrid attack
- Components: Cyber + information influence operations
Context
This hybrid approach combines technical cyber capabilities with information warfare tactics, using stolen data for strategic influence purposes beyond traditional ransomware extortion.
Notes
- Emerging hybrid threat model
- Strategic rather than purely financial motivation
- Confidence: high