Once malware is in the system, it establishes a connection to the infiltrator’s computer and transmits information gathered from its initial beachhead.
She was now locked out of her account. She was shocked at how quickly it had happened and the fact that the call and each of the text messages had come from the number she had saved for Bank of America on her phone.

