Researchers confirmed that hacker used a USB installed with Malware for the attack.
Once the malware was injected the hackers would then patch the hole.
But the other side of the coin offers another clue.
Obviously the second code could only be known to the inventor of this malware.
source: www.techworm.net