Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
americaman80
Highly Voted 2Â years, 2Â months agoDaniel8660
Highly Voted 8Â months, 3Â weeks agobaskan
Most Recent 9Â months agobaskan
9Â months agobaskan
9Â months agoOliverotuns
1Â year, 5Â months agoDumHeaD
1Â year, 6Â months agouzey
1Â year, 6Â months agoANDRESCB1988
1Â year, 11Â months agoKamal_SriLanka
1Â year, 11Â months agoJoker20
2Â years, 2Â months ago