Which Type Of Trojan Horse Security Breach Uses The Computer Of The Victim As The Source Device To Launch Other Attacks?

Which Type Of Trojan Horse Security Breach Uses The Computer Of The Victim As The Source Device To Launch Other Attacks? Which type of Trojan horse security breach uses the computer of the victim as the source device to launch other attacks? Explanation: The attacker uses a proxy Trojan horse attack to penetrate one device