Depends on what type of vulnerability was exploited and what kind of maleware or operations were conducted while hacked.
An simple example. If you were running Linux and someone somehow was able to access your command prompt remotely. They could type in certain commands that when executed would destroy your computer and leave them unrecoverable.