Hack and Leak: Cyber attacks meet information influence operations

Summary

The Hack and Leak phenomenon combines cyber attacks with information influence activities. Attackers breach targets, steal critical information, then utilize it against the victim. This represents a hybrid attack approach.

Key Details

  • Phenomenon: Hack and Leak
  • Method: Data breach → theft → exploitation/publication
  • Classification: Hybrid attack
  • Components: Cyber + information influence operations

Context

This hybrid approach combines technical cyber capabilities with information warfare tactics, using stolen data for strategic influence purposes beyond traditional ransomware extortion.

Notes

  • Emerging hybrid threat model
  • Strategic rather than purely financial motivation
  • Confidence: high