Once launched, the virus is designed to install a Trojan horse or backdoorprogram, and allow investigators to record everything typed into that machine, thereby getting around encryption and passwords.
The backdoor could take the form of an installed program or subvert the system through what is known as a rootkit, a malicious software hard to detect.