You must log in or # to comment.
This malware is not too hard to protect against. There have been two kinds of exploits it uses, one of which being missed Whatsapp voice call which I think has been patched.
The main one is a URL sent via SMS, which you do not have to click.
So basically, the malware takes advantage of bad OPSEC and bad IT 101 practices on the user targets.
out of interest, how would that hostile SMS URL work with those SMS preview things alot of mobile SMS messaging implementations use?
Disable preview or use clients that allow to disable or cannot preview. QKSMS works just fine for me.