A financial services company discovers that an employee's computer has been transmitting sensitive client data to an external server. The IT team suspects malware is involved and has identified a process that seems to be masquerading as a valid application. Which type of malware is designed to perform unauthorized actions while disguising itself as legitimate software?
Virus
Worm
Trojan
Ransomware