A user received an email from their bank asking them to login and verify their personal information. The user complies and fills in the requested information. Days later the user notices their checking account is empty. This is a result of which of the following?
D. A Trojan