Ann, a customer, is reporting that several important files are missing from her workstation. She recently received communication from an unknown party who is requesting funds to restore the files. Which of the following attacks has occurred?
A. Ransomware
B. Keylogger
C. Buffer overflow
D. Rootkit