## Vectors * Data about users(identity theft, credential reuse, security question answers) * DoS(vandalization, showing off skills) * Ransom and blackmail(data hostage, publishing internal docs) * Payment information(gift and credit cards, billing information) * Free stuff(Fake orders, free ads, free bandwidth or computing power) * Specific user info(location, purchase history, messages) * Targeted abuse(bulling, abusive partners or behavior) * Stalking(harassment, recon for other attacks)