• Steal Your Data

  • Use Your System To Attack Other Systems

  • Covert Communications Channel

  • Store Illicit Data

  • Political Statement

  • Government/Industrial Espionage

  • Vandalism

  • Financial Gain - by selling access to your compromised system to other Cyber Criminals

  • Blackmail