A program has been discovered that infects a critical Windows system executable and stays dormant in memory. When a Windows mobile phone is connected to the host, the program infects the phone's boot loader and continues to target additional Windows PCs or phones. Which of the following malware categories BEST describes this program?
|Compliance and Operational Security|
|Threats and Vulnerabilities|
|Application, Data and Host Security|
|Access Control and Identity Management|