Often after a successful attack, it is common foran attacker will load a Trojan in order to either;
- 1. Gain access to the system again (without security controls),
- 2. To use the exploited system as an attack platform
- a. For DDoS attacks against other sites
- b. To cover their tracks (i.e. logging)
- c. To attack other systems within the organization
Any system that has been compromised should not be trusted again unless it has been rebuilt in a secure manner.