The malware first needed to be set up by physically opening up the ATM equipment and attaching the cellular phone to the hardware by way of USB. No information and facts continues to be produced saying that Ploutus was made use of In this particular attack, but law enforcement https://financefeeds.com/ethereum-technical-analysis-report-9-july-2024/