Note that just penetrating the office/business network is highly valuable, because there's probably technical information on there like training materials, blueprints, operations guides, procedures, etc. This can help the attackers immensely to get past the airgap and once they get past the airgap.