Question:
What is the best way to describe this malware in the case that Joan noticed that a piece of malware on her network was spreading from system to system by automatically looking for open file shares and connecting to them using default credentials?