I found out today that it is FCM. The malware application uses FCM and the PUSHY messaging service to send messages to infected devices to download additional malware and execute malicious commands. What kind of log can I get if I ask Google for the log of the user who sent the message to the victim's device through FCM? And is there any way I can get the token value registered with FCM on the victim machine?
Asked
Active
Viewed 10 times