Threat actors get full access to compromised devices.