this post was submitted on 23 Sep 2025
240 points (97.6% liked)
Technology
75499 readers
2811 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related news or articles.
- Be excellent to each other!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, this includes using AI responses and summaries. To ask if your bot can be added please contact a mod.
- Check for duplicates before posting, duplicates may be removed
- Accounts 7 days and younger will have their posts automatically removed.
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Why does one need so many virtual phones for swat threats?
The implication is that it's operating as a general purpose mobile botnet of sorts, and there is likely someone out there selling services on it. It seems like someone was using it for swatting (which is how they found it), and others may have been using it for spam and forum bots. The narrative that it was specifically a tool for attacking cellular infrastructure is a bit misleading. It might have been useful for that but as far as well know it was never used that way.