Their attack goal is to hijack all mobile traffic from the device by forcing all HTTP/HTTPS traffic to go through a proxy server controlled by the attacker.
The attack vector for the hijack is either through OMA client provisioning, the iPhone Device Configuration or Android OS Configuration APIs
Their attack goal is to hijack all mobile traffic from the device by forcing all HTTP/HTTPS traffic to go through a proxy server controlled by the attacker.
The attack vector for the hijack is either through OMA client provisioning, the iPhone Device Configuration or Android OS Configuration APIs