

After a successful connection has been established, the server will download more apps onto the device, ranging from adware, spyware, and even ransomware.

However, the malware will now contact its Command & Control (C&C) server, providing the compromised device's details. Once all of this is done, the Flash player pop-up will disappear. All of these are required for the attacker to mimic the user's clicks, and select anything on the screen. This will now request permissions to monitor the user's actions on the phone, retrieve window content, and turn on explore by touch. It will display real services used by the system, but it also includes a "Saving Battery" option, which is created by the malware.
#Adobe updater trojan android#
Should the user finally accept its demands, they will be redirected to a legitimate Android Accessibility settings page. The page claims that in order to fix this, they must activate a "new 'Saving Battery' mode." The pop-up further claims that the user's current power saving mode is no longer working, and the message will keep appearing until its endorsed battery mode is enabled. If the user falls for the fake message, another prompt will be displayed, this time an alert about too much consumption of the battery.
