## Vectors

* Data about users(identity theft, credential reuse, security question answers)
* DoS(vandalization, showing off skills)
* Ransom and blackmail(data hostage, publishing internal docs)
* Payment information(gift and credit cards, billing information)
* Free stuff(Fake orders, free ads, free bandwidth or computing power)
* Specific user info(location, purchase history, messages)
* Targeted abuse(bulling, abusive partners or behavior)
* Stalking(harassment, recon for other attacks)