Submitter : c2a
Date: 20 April 2023
Bounty : undisclosed
Vulnerabilities :
Programs :
Authors :
Link : https://astrix.security/ghosttoken-exploiting-gcp-application-infrastructure-to-create-invisible-unremovable-trojan-app-on-google-accounts/