Device Exploitation [WITH CONSENT ONLY]
Service
Information
The premise of Device Exploitation is to target, & exploit a person of interest via their electronic devices. This will be accomplished through 2 different avenues, both of which are included & not available for a lesser price individually.
The first will be utilizing an in-house platform that allows us to build, & infect a target device via malicious payload. This payload can be a .pdf, .doc, .txt, .png, .jpeg, etc. As we have significantly improved our platform, the file does NOT have to be a .exe to infect the host any longer, thus averting most, if not all, suspicion. All payloads provided by The Aracari Project are FUD (Fully Undetectable). FUD simply means that no antivirus platform, including Windows Defender, will detect it enabled by default on Windows PCs.
The second will be a piece of hardware provided to you by us. The hardware will be in the form of a USB or a charging cable. Both behave, look, & feel precisely like their legitimate, respective counterparts, with one distinct difference: this piece of hardware will inject & self-install a malicious payload onto the device it is plugged into. This could be a keylogger, file dump, message dump, etc. It all depends on the specifics of the intel desired by the client. In most cases, we recommend a simple backdoor to manually find the desired data for the client.
Capabilities:
Utilizing an exploitative payload, the capabilities are as follows:
-Archived & live passwords, & cookies (to bypass 2 Factor Authentication)
-Credentials, i.e., credit cards, debit cards, identification documents, etc
-Screen & Webcam observation; screenshots on demand
-Files: complete access to every file on the target machine (upload & download)
-Messages & emails; full access to emails sent/received & messages sent via IM such as WhatsApp, Telegram, etc. (Signal, OTR XMPP messaging, & other P2P messengers excluded).
-Text messages
-In-browser CryptoCurrency Wallet Stealer
-Ransomware