Crime ❯Cyber Crime
Botnets Hacking Groups Counter-Hacking
The campaign relies on uncertified Chinese Android gadgets preloaded with malware to create a sprawling residential proxy network.