If an operation is successful, the threat actor will have impacted their target. Depending on their objective, this could include service degradation, manipulation, exfiltration or complete destruction of a system or network. In the case of ransomware, for example, threat actors aim to exfiltrate sensitive data and encrypt systems for profit, whereas DDoS attackers aim to cause temporal network and endpoint disruption.