2017年11月15日 星期三

TrendLabs: Toast Overlay Weaponized



Figure 1: An illustration of how the Toast overlay attack works: an apparently benign image (left) is superimposed over actual actions the malware triggers, such as requesting for Accessibility 
REF: http://blog.trendmicro.com/trendlabs-security-intelligence/toast-overlay-weaponized-install-android-malware-single-attack-chain/

沒有留言:

張貼留言