Question from my curious mind. How are the Metamask instances of specific device getting replaced by modified/malware-d version? How does that even work?
Thanks! That is some extensive level of social engineering, reconnaissance and exploiting. Takes a lot of patience and discipline to pull such sophisticated heist.