cyber attacker

Most cyber attackers are likely to use the easiest route in. They're lazy. No different from your run-of-the-mill hijacker who will gladly steal the car of someone who leaves the keys in it. In the case of the cyber criminal, he will of course test the 'lowest common denominator' method against the widest range of IP addresses from the same source set of IP addresses.