We have gained full access to your system. All sensitive data has been extracted.
Your security vulnerabilities have been exploited.