Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year agoNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoexternal-linkmessage-square1linkfedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 year agomessage-square1linkfedilink
minus-squareblinky@programming.devlinkfedilinkEnglisharrow-up2·edit-21 year ago Audio and camera recording File manipulation Information exfiltration (call logs, contacts, SMS messages, installed app information) Device control (volume, Wi-Fi, Bluetooth) Keylogging Administrative actions (factory reset, lock screen control) Crazy stuff
Crazy stuff