

Collecting Contact Lists: Joker exfiltrates contact lists from infected devices.This could allow the malware to engage in various types of fraud. Making Phone Calls: Joker has the ability to perform calls from the infected device.This could allow the malware to access sensitive information that is not contained in SMS messages or notification content. Taking Device Screenshots: Joker malware has the ability to take screenshots of infected mobile devices.

Joker can intercept OTPs, defeating MFA and enabling the attacker to take over the user’s accounts. This allows the malware to collect and intercept One-time passwords (OTPs) which are a common but insecure form of implementing multi-factor authentication (MFA).

