Key Capabilities of Poison Ivy 3.0.3
- Remote Desktop Control (View & manipulate victim’s screen)
- File System Access (Upload, download, delete files)
- Keylogging (Records keystrokes for credential theft)
- Webcam & Microphone Hijacking (Silent surveillance)
- Process Injection (Hides malware inside legitimate apps)
- Live Screen Viewing (Spy on victim in real-time)
- Remote Command Execution (Run malicious scripts)
- Password Stealing (Extracts saved logins from browsers)
- Clipboard Hijacking (BTC, ETH, XMR, etc.)
- Wallet Address Swapping (Silently changes pasted addresses)
- Browser Injection (Modifies crypto-related web pages)
- Process Hollowing (Hides inside explorer.exe, svchost.exe)
- Encrypted C2 Communication (Avoids network detection)
- Auto-Startup via Registry (Survives reboots)
- USB Propagation
- Ransomware Deployment
- DDoS Botnet Recruitment