I understand the concepts of double (and triple) agents in the context of politicals and the tangible world, but can someone explain to me how double agents work in the world of computer technology? I tried looking it up, but the only piece of useful information I could find is that double agents have high user consent but severe negative consequences. Is this the only real definition for them or are they a more specific group of malware?