Jane's organization recently experienced a security incident that occurred when malware set to trigger on the chief executive officer's (CEO's) birthday deleted all of the company's customer records. What type of malware was used in this attack?