![]() Remote connection establishment: socket open call, Bluetooth pairing, APN settings edit….Audio/video flow interception: call recording, video capture….Telephony services abuse: premium SMS sending, phone call composition….Connection interfaces information exfiltration: WiFi credentials, Bluetooth MAC adress….Geolocation information leakage: GPS/WiFi geolocation….Device settings exfiltration: software version, usage statistics, system settings, logs….Telephony identifiers exfiltration: IMEI, IMSI, MCC, MNC, LAC, CID, operator’s name…. ![]()
0 Comments
Leave a Reply. |