If the attacker could establish a backdoor into the companies systems while the unsuspecting target browsed through the files. What would happen and how this information could be used against someone?

If the attacker could establish a backdoor into the companies systems while the unsuspecting target browsed through the files. What would happen and how this information could be used against someone?

quanswer.com