The exploit works by highjacking a legitimate app as it’s launched on almost any Android phone. Instead of going to the welcome screen or login page, the exploit allows a piece of malware to display so-called permissions pop-ups, the kind that asks if the app can access your contacts, location, and stored data. When you approve the request, the malware is given all of the permissions instead of the legitimate app, which continues to run as if nothing happened.
Related posts
-
Accidental Bitcoin Transfer Pushes Satoshi Nakamoto’s Genesis Wallet Over 100 BTC
Based on the latest data, the well-known Genesis address owned by Satoshi Nakamoto now holds over... -
Crypto and banking: tokenization of the global financial system is yet to come
Disclosure: The views and opinions expressed here belong solely to the author and do not represent... -
Genesis Global can distribute billions to creditors: judge
Genesis Global, the digital assets lender that went bankrupt last year, received court approval to pay...