Part 5/9:
Throughout the call, the hackers gained the trust of the creator and exploited it. They even orchestrated a situation in which the creator left the camera to change shirts for a "newsletter" picture, a period during which the intruders accessed and downloaded harmful software. By the time the creator resumed the discussion, it was too late; the hackers had already planted malicious programs in the system.