- 4
- 0
- 13 Авг 2025
- Remote Desktop Control – Full GUI access to the victim's system, allowing real-time manipulation.
- Keylogging & Credential Theft – Logs keystrokes to steal passwords, banking details, and sensitive data.
- Webcam & Microphone Hijacking – Secretly activates cameras and mics for surveillance.
- File Manager – Browse, upload, download, or delete files from the infected machine.
- Process Manipulation – Terminate or disguise malicious processes to avoid detection.
- Persistent Installation – Ensures survival after reboots via registry or startup modifications.
- Anti-Detection Mechanisms – Polymorphic code, encryption, and VM/sandbox evasion techniques.
- Network Propagation – Spreads across connected devices via exploits or USB drives.
- Reverse Proxy & VPN Masking – Hides attacker's IP using TOR or proxy chains.
- Discord & Browser Data Theft – Extracts saved logins, cookies, and Discord tokens.