Trojan uses a key internet feature to receive marching orders

Trojan uses a key internet feature to receive marching orders