Exploiting Instruction-Following Retrievers for Malicious Information Retrieval