This version of Joker infection has added more actions compared to the previous Joker infections,
It can access users' contact info and exfiltrate it across the network.
The application can hide its icon once installed, making it difficult to remove.
It
Researchers have discovered threat actors have been exploiting critical Log4Shell flaw in the Log4j library at least one week before the public disclosure.