Exploit Cursor Agents to create persistent, distributed threats