Malicious attempts to gain access to computing resources via criminal means.