Leo hadn’t ordered anything. Through the peephole, he saw the man’s jacket had a patch that read “QuickServe Logistics” —a company he’d never heard of. The man’s phone screen, visible under his clipboard, glowed with a familiar orange-and-white logo.
His cursor moved on its own. Just a tiny jitter, like a ghost shrugging. Then, a folder of client invoices opened and closed in half a second.
The man whispered at the door: “Mr. Hart, open up. We traced the DNS spoof back to a router on your floor. We need to scan your machine physically. The backdoor you submitted is part of a botnet that’s been dormant for six months. You just woke it up.” avast shields control
Leo stared at his monitor. The Avast tray icon now pulsed red.
Suddenly, his desktop went silent. The fan stopped spinning up. No background chatter. Just the hum of the hardware. Leo hadn’t ordered anything
He pressed it.
He didn't delete them. Instead, he activated the CyberCapture feature—Avast’s cloud analysis tool—and uploaded the backdoor file to the lab. Then he pulled the ethernet cable. His cursor moved on its own
But under Network Shield , a tiny sub-status read: