Accounts that are already compromised can be used by an attacker to gain permanent access to the system.