Federal agencies and other law enforcement agencies are trying, but are again often overwhelmed, unable to investigate every single compromisedmachine.
In lab experiments, the researchers exploited a loophole in the way Origin handles links to games users have downloaded and installed to make it run code that compromised a target machine.
Still, even data stored only on a local computer or drive can be compromised by a determined hacker who targets it when the machine is online, or if it is lost or stolen and falls into the wrong hands.