What do hackers use to change public keys and prevent authorized users from accessing their own data?

A. Cryptovurology
B. Infiltration
C. Malware
D. Ransomware

D. Ransomware