19-02-2024, 08:42 AM
This Trojan is quite dangerous if it infects a device. If installed, the GoldPickaxe trojan can collect facial recognition data such as Face ID , user identity documents, and intercept text messages. All this data is collected so that the perpetrator can more easily drain the money in the victim's bank account or in other financial applications.
Sadly, the perpetrator also used this data to create visuals processed by artificial intelligence (AI) or known as deepfakes , then he disguised himself as the victim and accessed their bank accounts.
Along with the detection of this malware , researchers also discovered a new variant of GoldDigger called GoldDiggerPlus. This virus has been made even more sophisticated, because it can be used by hackers to contact victims in real-time via the affected device, compiled by KompasTekno from TomsGuide , Monday (19/2/2024).
Because it was deleted, the perpetrator then persuaded the victim to install a Mobile Device Management (MDM) profile. MDM is a set of tools that the IT team at a company uses to manage phones, computers, and other office devices. In short, if the iPhone owner is tricked into creating that profile, then the hacker ultimately has control of the iPhone.
https://tekno.kompas.com/read/2024/02/19...ening-bank
Sadly, the perpetrator also used this data to create visuals processed by artificial intelligence (AI) or known as deepfakes , then he disguised himself as the victim and accessed their bank accounts.
Along with the detection of this malware , researchers also discovered a new variant of GoldDigger called GoldDiggerPlus. This virus has been made even more sophisticated, because it can be used by hackers to contact victims in real-time via the affected device, compiled by KompasTekno from TomsGuide , Monday (19/2/2024).
Because it was deleted, the perpetrator then persuaded the victim to install a Mobile Device Management (MDM) profile. MDM is a set of tools that the IT team at a company uses to manage phones, computers, and other office devices. In short, if the iPhone owner is tricked into creating that profile, then the hacker ultimately has control of the iPhone.
https://tekno.kompas.com/read/2024/02/19...ening-bank