An unscrupulous hacker aims to execute a type of attack that exploits a a vulnerability in the hardware of a phone's loudspeaker output, extracting data from various sources such as voice assistants, multimedia messages, and audio files using a malicious app. This attack jeopardizes speech privacy. Which of the following terms characterizes the attacker's intended exploit?