When they do attack hardware,
their initial strategy is usually to launch software attacks on hardware resources,
which can be accomplished remotely with no extra equipment,
rather than physical attacks,
which typically require proximity to the victim computer and equipment for taking physical measurements,
like power,
electro magnetic,
or acoustic measurements.