An organization's network has been compromised with software that appeared legitimate but has provided attackers with unauthorized access. Which of the following BEST describes the type of malware used in this scenario?
Ransomware
Trojan
Virus
Spyware