Hackers are targeting enterprises with a jpeg file, establishing persistence and elevating privileges.