Final answer:
Computer systems can get infected with malware via exploits called 'Trojan horses,' which are disguised as safe programs. Hackers use these to infiltrate systems, and they have become a tool for governments and cybercriminals to cause chaos and steal information.
Step-by-step explanation:
Computer systems are often infected with malware through the use of exploits that disguise themselves as harmless or legitimate software. These exploits, which take advantage of vulnerabilities within the system, are typically known as 'Trojan horses' or simply 'Trojans'. Similar to the ancient story where Greek soldiers hid inside a wooden horse to infiltrate Troy, this type of malware hides its malicious intent within an apparently useful program or file.
Hackers utilize various tactics to compromise systems. They may deploy Trojans to trick individuals into clicking on malicious links or to persuade them to disclose sensitive information. Additionally, governments and cybercriminals weaponize cyberspace to conduct espionage, disrupt communications, interfere with networks, and spread disinformation by hacking into systems.