Typically amateur attackers known as "
script kiddies" who gather victim computers (referred to as "roots") that can be used to host a phishing site or a spam relay. In some cases,
exploiters will break into
credit card databases directly to harvest credit card data, skipping the phishing stage entirely.