remote servers could be used as a tool by these attackers in triggering the exploit (Sharma