In which type of attack does the attacker eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for in which type of attack does the attacker exploit a malicious app to breach speech privacy and gather information from data sources

Full Certification Question

In which type of attack does the attacker exploit a malicious app to breach speech privacy and gather information from data sources such as voice assistants, multimedia messages, and audio files?