There is one specific feature hackers often use to maintain persistence and exfiltrate data.