Maya smiled. The wipe command was the last piece they needed—it contained the attacker’s unique digital signature.
“It’s a watering hole,” Maya breathed. “Not a file-based attack. A profile-based trojan. The malware wasn’t in the PDF. The PDF was a beacon activator.” linkedin ethical hacking: trojans and backdoors
The backdoor was exfiltrating employee Social Security numbers. Maya smiled