Answer :

Keylogger, or Spyware

Answer:

The hacker is most likely using a keylogger

Explanation:

Other Questions