Watch this video on YouTube
An organization experiences a security breach where malicious software infiltrates the network and compromises the integrity of data. What type of cyber attack is consistent with this scenario?