Establish persistence

The attacker expands their access and creates a "ghost network" to maintain access