RSA Research investigated the source of suspsicious, observed beaconing thought to be associated with targeted malware. In the course of this tactical hunt for unidentified code, RSA discovered a sophisticated attack on a software supply-chain involving a Trojan inserted in otherwise legitimate software; software that is used typically used by enterprise system administrators. Get details of this attack as well as mitigation and detection strategies.