The exploit works by highjacking a legitimate app as it’s launched on almost any Android phone. Instead of going to the welcome screen or login page, the exploit allows a piece of malware to display so-called permissions pop-ups, the kind that asks if the app can access your contacts, location, and stored data. When you approve the request, the malware is given all of the permissions instead of the legitimate app, which continues to run as if nothing happened.
Related posts
-
Technologist: Decentralized Data Crowdsourcing Is Key to Countering Big Tech’s Dominance
A tech CEO proposes “democratizing” AI by using decentralized... -
Data protection is not an excuse when tackling scams and fraud
We are calling on organisations to share personal information responsibly to protect their customers from scams... -
Stripe, Circle Bring USDC Stablecoin Services to Aptos to Boost Global Payments
“Adding support for the Aptos blockchain inside our crypto products broadens consumer and merchant access to...