Please, please help this naive soul understand.
The article states, “ Once victims accessed the site, the Insomnia exploit was loaded on the device, granting the attacker root access.”
Does this literally mean that merely visiting a site, without selecting any link, gives the attacker access to the device?