By modifying the vehicle's operating system / boot / system partition, the attacker can remain permanently on the target system.