KidM to CybersecurityEnglish · 20 hours agoNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoKidM to CybersecurityEnglish · 20 hours agomessage-square1fedilink
minus-squareblinky@programming.devlinkfedilinkEnglisharrow-up2·edit-216 hours ago Audio and camera recording File manipulation Information exfiltration (call logs, contacts, SMS messages, installed app information) Device control (volume, Wi-Fi, Bluetooth) Keylogging Administrative actions (factory reset, lock screen control) Crazy stuff
Crazy stuff