Android Devices at Risk After Fake Adobe Flash Player App Installs Malware

A fake Adobe Flash Player being installed on Android devices is spreading malware like wildfire.

When Android users download this malicious application, an “Activate Device Administrator” popup displays.  At this point, they are either damned if they do and damned if they don’t.  By clicking cancel, the message just repopulates.  Once the user hits “Activate”, the Trojan is given administrative rights.  The popup then disappears; however, the Trojan is still active.

However, there is good news.  According to Hack Read, the Trojan can be manually removed by going to: Settings>Security>Device Administrators>Google Play Services>Deactivate.  Once the administrative rights are deactivated, the user can find the Flash Player update and delete it.

It is imperative users delete this as soon as they realize they have become infected.  The malware has capabilities to access various major applications within your cellular devices, such as Facebook, Facebook Messenger, Snapchat, Twitter and Viper.  Also, it has targeted over 90 mobile banking applications.  Meaning, it can create a fake login window for your mobile banking to obtain your login credentials.  Lastly, the malware has the ability to intercept your SMS messages.  Which not only impacts your SMS messaging, but also any two-factor authentication that uses SMS messaging.

Again, if you have been infected, please follow the bolded steps above to remove the Trojan before additional damage is done.

Stop Responding to Threats.
Prevent Them.

Want to get monthly tips & tricks?

Subscribe to our newsletter to get cybersecurity tips & tricks and stay up to date with the constantly evolving world of cybersecurity.

Related Articles