Event JSON
{
"id": "59c9ed54a8d4d3b26783d9742cf7e5a57dd2696161aef0993cb9b6021941f6bc",
"pubkey": "a0c598eba122a39fe6bf50c17a7a2787754903664afa79cb94d2103794b06dd5",
"created_at": 1728927672,
"kind": 1,
"tags": [
[
"t",
"mobile"
],
[
"t",
"security"
],
[
"proxy",
"https://schleuss.online/@itsecbot/113307003920798980",
"web"
],
[
"t",
"google"
],
[
"proxy",
"https://schleuss.online/users/itsecbot/statuses/113307003920798980",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://schleuss.online/users/itsecbot/statuses/113307003920798980",
"pink.momostr"
],
[
"-"
]
],
"content": "TrickMo malware steals Android PINs using fake lock screen - Forty new variants of the TrickMo Android banking trojan have been identified in the wild... https://www.bleepingcomputer.com/news/security/trickmo-malware-steals-android-pins-using-fake-lock-screen/ #security #google #mobile",
"sig": "cd4cd470dd91d05a1d5ba831fa0f8b74f8d234a7d199a9dfe36732a5b2e02e6874cdd949e36fc5f1c1abee196bee60479aecba3405344cd9aa146c3e85e44b1a"
}