unless the article left out some pertinent details, this malware uses standard system permissions to acquire data. this is more of a social engineering and deception effort than an exploit. install sketchy packages, win sketchy prizes.
unless the article left out some pertinent details, this malware uses standard system permissions to acquire data. this is more of a social engineering and deception effort than an exploit. install sketchy packages, win sketchy prizes.