Rapid collection & data exfiltratation, often within minutes, before self-deleting from the compromised device.