Well, for most of those type of illegal operations you don’t want to actually own the computing power you are using. Because then they’ll trace it right back to you and you’ll go to jail.
Hackers would much rather use YOUR and MY computing power to do those things, and leave a more twisted path for the investigators to follow when they try to trace the attacks back to their origin.
If they are used to rig elections, then there will be no tracing back by the MSM or the Swamp.