: Designed to harvest saved passwords, credit card details, and browser cookies.
: The use of adult content as a "lure" is a hallmark of low-effort but high-volume phishing campaigns.
: Allows an attacker to take control of your webcam, microphone, and files.