They used the stolen compute power and LLM access they gained to power sexual roleplay bots accessible to users via a paid subscription – using “common jailbreak techniques to bypass model content filtering.”
Intriguingly, they also used some clever techniques to check if a model was available to them for illegal use – including calling AWS APIs that are “not included in the aws-cli (SDK) or in the API reference guide.”