- When the trojaned system comes online i.e. when the trojaned system is on active connection an attacker can access to that system.
Hence , it is must that target system is on active connection in order to have access of it .
- Access enables attacker to deploy various attacks on the trojaned target.
Attacker Active connection Trojaned