Hijacking User Uploads to Online Persistent Data Repositories for Covert Data Exfiltration