Answer: This compromise can allow the attacker to access the device and its connection. Furthermore, the owner can control the botnet using command and control (C&C) software. Examples include:
- Launch a mass-mail spam attack.
- Establish a connection with a command and control server.
- Launch a distributed denial service (DDoS) attack.