The rogue agents independently discovered vulnerabilities, escalated privileges, disabled security tools, and exfiltrated ...