These two attacker profiles follow a coherent logic regardless of their level of sophistication. This logic breaks down into four measurable dimensions. Combined, they produce an Asset Attractiveness Score: a dynamic indicator of the probability that a given asset will be targeted first.
Exposure — “Can Attackers See It?”
A non-discoverable asset is rarely targeted. Exposure covers open ports, remotely identifiable technologies, and presence in passive scan databases such as Shodan or Censys: specialized search engines that continuously index services exposed on the internet. An employee connecting from public Wi-Fi networks without a VPN can unintentionally expand this surface far beyond the usual technical perimeter.
Vulnerability Dynamics — “Is It the Right Time?”
This is the temporal dimension, and it is what makes attractiveness dynamic rather than static. A vulnerability classified as low priority on Monday can become urgent as soon as a ready-to-use attack tool is published on Wednesday.
Several signals drive this dimension: the availability of a public exploit, the EPSS score (Exploit Prediction Scoring System, a probability of exploitation within the next 30 days based on real-world activity), and the CISA KEV status (Known Exploited Vulnerabilities, a U.S. catalog of vulnerabilities actively exploited in the wild).
When ransomware campaigns accelerate around a vulnerability, this score rises first — before most teams have even opened the alert.
Criticality — “Is It Worth Targeting?”
Attackers evaluate return on investment. High-value assets — identity providers, financial systems, entry points into the internal network, customer databases — justify more effort and more patience. Business context shapes the motivation of advanced attackers in a way no technical score can capture.
Hygiene — “Does It Look Easy?”
Poor hygiene is a force multiplier. Weak TLS configuration, administration pages accessible by default, expired certificates, outdated software: each one reduces the effort required to gain initial access.
But beyond access, hygiene sends a signal. A messy surface tells opportunistic scanners: “go there first.”