An example of how a single malware operation can enable both criminal and state-sponsored hacking.