To ensure that the infected module can be run by the system, the malware overwrites the system's runtime library, depending on the version of the user's Android device. To complete the installation of the stand-alone application, the system's authorized trojan will turn off Verify Apps and adjust the system settings, allowing applications to be installed from third parties.
"In addition, it can give the com.qualcmm.timeservices application the Administrator Administrator administrative rights without user intervention, just by running the command. That's a very different way to gain administrative rights." This third-party application will connect the infected device to the attacker's server, giving complete control of the device to the hacker.
However, researchers still do not know which Android device is infected with the command, so it is unclear what kind of file it is executing, but it could be an ad file or a poison.
Researchers are still testing the malware, but users who have installed the game are advised to back up phone data and perform data reset to avoid malware attacks.
To protect your phone from such applications, always be cautious of untrusted applications, especially when downloading from Google Play Store. Remember to only grant application verification rights when the content is relevant to the purpose of the application. Don't forget to read the user comments section before installing. In addition, anti-malware applications on your phone can detect and block malware before they infect your phone.