It is a known fact that criminals want to secure a foothold on a system by establishing a back door. The required tools are also very easy to get hold of – this does not come as a surprise either. However, it never ceases to amaze how easy it is to acquire an almost “custom” malware if you have enough of a criminal in you.