Executing shell commands or forcing the device to restart/shutdown.

Hidden inside "invoice" or "shipping" attachments.

Remotely activating the webcam or microphone to record audio and video.