Don, a student, came across a gaming app in a third-party app store and installed it. Subsequently, all the legitimate apps in his smartphone were replaced by deceptive applications that appeared legitimate. He also received many advertisements on his smartphone after installing the app.
What is the attack performed on Don in the above scenario?
americaman80
Highly Voted 2Â years agoDaniel8660
Highly Voted 6Â months, 3Â weeks agobaskan
Most Recent 7Â months agobaskan
7Â months agobaskan
7Â months agoOliverotuns
1Â year, 3Â months agoDumHeaD
1Â year, 4Â months agouzey
1Â year, 4Â months agoANDRESCB1988
1Â year, 9Â months agoKamal_SriLanka
1Â year, 9Â months agoJoker20
2Â years ago