"Once inside, the attacker collects log-in information and other valuable data stored in the server." . . . .