Mandy dropped her phone and subsequently encountered an issue with the phone's internal speaker. Thus, she is using the phone's loudspeaker for calls and other activities. Rob, an attacker, takes advantage of this vulnerability and secretly exploits the hardware of Mandy's phone so that he can monitor the loudspeaker's output from data sources such as voice assistants, multimedia messages, and audio files by using a malicious app to breach speech privacy. What is the type of attack Rob performed on Mandy in the above scenario?