Menu
Sign In Add Podcast

Darknet Diaries

137: Predator

1490.529 - 1514.787 Bill Marczak

And analysis of this application quite clearly established that it was spyware. It had the capability to, for instance, exfiltrate files from the phone, take passwords, turn on the microphone and listen in to what was going on. So we were actually able to analyze the final payload of the spyware and understand what it was doing.

0
💬 0

Comments

There are no comments yet.

Log in to comment.