Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agoNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 2 days agomessage-square1fedilink
minus-squareblinkylinkfedilinkEnglisharrow-up2·edit-22 days ago Audio and camera recording File manipulation Information exfiltration (call logs, contacts, SMS messages, installed app information) Device control (volume, Wi-Fi, Bluetooth) Keylogging Administrative actions (factory reset, lock screen control) Crazy stuff
Crazy stuff