An organization's critical systems suffer a sudden failure after a former employee's user account is deleted. Investigation reveals that a hidden script was set to execute upon the removal of this account, leading to the malfunction. Which type of malicious attack does this scenario represent?
Worm
Ransomware
Rootkit
Logic bomb