1. 4
  1.  

  2. 1

    unless the article left out some pertinent details, this malware uses standard system permissions to acquire data. this is more of a social engineering and deception effort than an exploit. install sketchy packages, win sketchy prizes.