The answer is: "drive-by hacking" .
____________________________________________
"In drive-by hacking , an attacker accesses the network, intercepts data from it, and even uses network services and/or sends attack instructions to it without having to enter the home, office, or organization that owns the network."
_______________________________________________________________