Kid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agoNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoexternal-linkmessage-square1fedilinkarrow-up16arrow-down10
arrow-up16arrow-down1external-linkNorth Korean Hackers Deploy DocSwap Malware Disguised as Security Appsecurityonline.infoKid@sh.itjust.worksM to Cybersecurity@sh.itjust.worksEnglish · 1 day agomessage-square1fedilink
minus-squareblinky@programming.devlinkfedilinkEnglisharrow-up2·edit-21 day ago Audio and camera recording File manipulation Information exfiltration (call logs, contacts, SMS messages, installed app information) Device control (volume, Wi-Fi, Bluetooth) Keylogging Administrative actions (factory reset, lock screen control) Crazy stuff
Crazy stuff