Hackers want access to any number of things: To your facilities, your network, and to individual devices on that network. More often than not, hackers are looking to gain access to sensitive data.
Whatever it is they want to access, hackers look for the easiest way to access it.