Let me paint you a picture… We’ll assume you have (or have before) a compromised account somewhere. Now assume that instead of leveraging that compromised account to send out SPAM (and getting caught quickly), the attacker lurks, looking for what it needs to make...