An organization named Machali.org hired a third-party team to run its business operations. The company provided full access to the team for hosting their services. A team member with malicious intentions misused the access permissions and installed a backdoor on a host system. Identify the third-party risk demonstrated in the above scenario.