The ways explained in the cyber destroy chain can be a whole lot just like a stereotypical theft. The thief will complete reconnaissance over a setting up just before attempting to infiltrate it, and then go through many extra steps prior to making off with the loot. The MITRE ATTACK https://ieeexplore.ieee.org/document/9941250