A team of researchers claim attackers can exploit a vulnerability on Amazon's EC2 cloud storage platform in order to steal the cryptographic keys of other users. The researchers from Worcester Polytechnic...
It is built on an entirely different codebase and was compiled in November 2019
The Ukrainian national was part of spear-phishing campaign that enabled hackers to gain unauthorised access to victims' system
The tool uses zero-day bug in the Darwin XNU kernel
The malware avoids infecting every Android device, and rather focuses on hand-picked targets
Message telling people that they may be infected links to a malicious website which asks for personal details