Example 4: Malware Attack