The cyber-mercenary hacker breached the company's firewall.
The company hired cyber-mercenary services to protect their sensitive data.
The cyber-mercenary signed a contract to carry out a cyber attack on behalf of a client.
The cyber-mercenary group was hired to conduct a cyber attack on a rival company.