A medium-sized company recently incorporated a new third-party component within its payment processing system. Shortly thereafter, irregular transaction patterns and unauthorized fund transfers were detected. Based on this scenario, what is the most likely cause of this security issue?
The third-party component had a pre-installed backdoor used for unauthorized transactions.
The system was running on end-of-life software with known vulnerabilities.
The intrusion detection system had an outdated signatures database, missing detection of new threats.
Lack of multifactor authentication allowed easy access to the payment system.