Darknet Diaries
137: Predator
Bill Marczak
And analysis of this application quite clearly established that it was spyware. It had the capability to, for instance, exfiltrate files from the phone, take passwords, turn on the microphone and listen in to what was going on. So we were actually able to analyze the final payload of the spyware and understand what it was doing.
0
💬
0
Comments
Log in to comment.
There are no comments yet.