What type of Trojan did the hacker use?