![]() Leaking sensitive geographical information among other data like PII.Unauthorized access to PED (Personal Electronic Device) enabling command execution and filesystem access to the attacker. ![]() Exfiltration of user data that comprises PII and credentials. ![]() These are some malicious activities traced back to Firestarter: Once the payload is successfully executed, it activates malicious services on the victim's Android device.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |