Text this: Penetrating the Virus Monitoring and Analysis System Using Delayed Trigger Technique