Steal Your Data
Use Your System To Attack Other Systems
Covert Communications Channel
Store Illicit Data
Political Statement
Government/Industrial Espionage
Vandalism
Financial Gain - by selling access to your compromised system to other Cyber Criminals
Blackmail