The attackers used a combination of Android, Chrome, and Windows vulnerabilities, including both zero-days and n-days exploits.

Read more from the Source

By JDCAI