What do hackers use to change public keys and prevent authorized users from accessing their own data?

A. cryptovirology
B. infiltration
C. malware
D. ransomware

D. ransomware