The vulnerability enables hackers to trick desktop users into installing harmful applications by disguising them as official ones.
When the user installs the malicious package, it’ll plant the malware instead.

Olemedia / Getty Images

sarayut Thaneerat / Getty Images

style-photography / Getty Images