The context clearly explains what OP means. The meaning is that "This is not something that is achieved via simply hacking a normal device remotely. This is something that is achieved via doing something extra to the device first, and maybe then hacking it remotely."
Another thing is that if we begin to use "hack" for every means of attack and unauthorized access, then the word loses its meaning. There is no supply chain hack, but there is a supply chain attack.
Your definition of hack differs from mine. This is hack in every sense of the word: supply chain hack, signals hack, and more...