Trojan is used to disable a company's network management capabilities.
In this scenario, the system loads a malicious website that contains Trojan horse. When an unsuspecting user browses to the site, the user is persuaded to run the hidden Trojan. When the Trojan is executed on the user's host, it connects to the Zenoss NMS server and shuts it down. From this moment, all monitoring is stopped, and the attacker can shut down any services with no visual indication.