By overwriting the server’s controller firmware, and installing their own, hackers can take control of physical servers hosted in vendor “clouds.”