Executing shell commands or forcing the device to restart/shutdown.
Hidden inside "invoice" or "shipping" attachments.
Remotely activating the webcam or microphone to record audio and video.