One month after a software developer was terminated the helpdesk started receiving calls
that several employees computers were being infected with malware. Upon further
research, it was determined that these employees had downloaded a shopping toolbar. It
was this toolbar that downloaded and installed the errant code. Which of the following
attacks has taken place?