A compromise in the security of an online data repository that arises through negligence or deliberate attack. It is then exploited to foster further harmful or criminal action. Often a criminal will gain access to a computer network through exploiting an unpatched vulnerability, installing malware on the target system, using stolen credentials (or brute-forcing weak passwords), or social engineering. However, data breaches are not only the target of external actors. It is also quite common for insider threats such as disgruntled employees to steal or destroy data as well. Some motivations for data breaches include:
Extortion
A criminal will steal data and threaten to release it publicly unless the victim pays them (usually in bitcoin).
Sale of Personally Identifiable Information (PII)
Criminals will steal personally identifiable information and resell it to criminals who use it for other crimes such as fraud and money laundering.
Industrial Espionage
Theft of company data or trade secrets for financial gain. This type of activity is typically carried out by state actors, business competitors, or employees who are leaving to work for a competitor or start their own company.