A technician discovers user input has been captured by a malicious actor. Which of the following malware types is MOST likely being used?
A. Cryptominers
B. Rootkit
C. Spear phishing
D. Keylogger
A. Cryptominers
B. Rootkit
C. Spear phishing
D. Keylogger