Byzantine Outside, Curious Inside: Reconstructing Data Through Malicious Updates