This seems like a textbook Trojan horse example to me. The malicious code was hidden inside legitimate software to trick the user into installing it. That's the classic Trojan attack vector. I'm confident that's the right answer here.
I want to say that configuring a security group for inbound traffic is crucial, but I'm unsure if I should implement that with a new domain or just reconfigure the existing one.
upvoted 0 times
...
Log in to Pass4Success
Sign in:
Report Comment
Is the comment made by USERNAME spam or abusive?
Commenting
In order to participate in the comments you need to be logged-in.
You can sign-up or
login
Margart
4 months agoNichelle
4 months agoLyda
4 months agoMauricio
4 months agoBecky
4 months agoCasie
5 months agoLatricia
5 months agoWenona
5 months agoLorrie
5 months agoLeonida
5 months agoLindsay
5 months agoFletcher
5 months agoBambi
5 months ago