Answer:
The hacker is most likely using a keylogger
Step-by-step explanation:
9.4m questions
12.1m answers