Ben's system was infected by malicious code that modified the operating system to allow the malicious code author to gain access to his files. What type of exploit did this attacker engage in?
Back door -undocumented command sequences that allow a way to bypass normal access restrictions