They can upload stolen information to a hijacked server that...
They can upload stolen information to a hijacked server that isn't connected to them at all. They don't ever have to leave a trail that can be followed back to them.
Click Here or the flag on image above to change the background image