An organization has recently experienced a security breach where multiple endpoints were remotely controlled by an unauthorized entity, leading to the unauthorized use of system resources for mining cryptocurrency. Which type of malware is MOST likely responsible for this incident?
Worm
Logic Bomb
Botnet
Ransomware