If you have downloaded this specific version, uninstall it and run a scan with a mobile antivirus like Bitdefender or Malwarebytes.
Your contact list, location data, and private photos are uploaded to a remote server. 🛠️ How to Stay Safe
It can read your texts to bypass Two-Factor Authentication (2FA).
This file is a "Trojanized" application. It often masquerades as a harmless utility, a leaked game beta, or a cosmetic "mod" for popular social apps. The "Cutely" branding is a social engineering tactic intended to lower the user's guard. 🚩 Key Risks in v0.12.033
The software allows attackers to take screenshots or record audio without your knowledge.
If you have downloaded this specific version, uninstall it and run a scan with a mobile antivirus like Bitdefender or Malwarebytes.
Your contact list, location data, and private photos are uploaded to a remote server. 🛠️ How to Stay Safe
It can read your texts to bypass Two-Factor Authentication (2FA).
This file is a "Trojanized" application. It often masquerades as a harmless utility, a leaked game beta, or a cosmetic "mod" for popular social apps. The "Cutely" branding is a social engineering tactic intended to lower the user's guard. 🚩 Key Risks in v0.12.033
The software allows attackers to take screenshots or record audio without your knowledge.