The attackers used a combination of Android, Chrome, and Windows vulnerabilities, including both zero-days and n-days exploits. …read more

Source:: ZDNet