Everyone Can Attack: Repurpose Lossy Compression as a Natural Backdoor Attack