@csrf

23.10.2021 Featured ALERT: New Android Malware ‘Flubot’ Stealing Credit Card Details

Published 23rd Oct, 2021

By Daniel Ojukwu

A new malware, Flubot, considered to be high-risk and damaging, threatens users of Android-enabled devices.

The malware is capable of obtaining financial login data from a device and also obtaining contact information to target other users.

With a modus operandi to initially send harmless-looking text messages, appearing as if they are popular brands to Android users and instructing them to click on a link for further instructions, the Flubot masks itself well.

READ ALSO: Rwanda, UAE, Morocco… The Countries Hacking into Journalists’ Phones with Pegasus

On Friday, the Nigerian Communications Commission (NCC) warned Nigerians to be vigilant lest they incur “incalculable financial losses.”

Ikechukwu Adinde, Director of Public Affairs (DPA), NCC, was quoted in a report to have said, “The ngCERT (Nigeria Computer Emergency Response Team) affirmed that Flubot impersonates Android mobile banking applications to draw fake web view on targeted applications and its goal transcends stealing personal data. It essentially targets stealing of credit card details or online banking credentials.

“Flubot is circulated through Short Message Service (SMS) and can snoop on incoming notifications, initiate calls, read or write SMSes, and transmit the victim’s contact list to its control centre.

READ ALSO: UNCOVERED: Cyber Weapon Used by Governments to Target Activists, Journalists

“This malware attacks Android devices by pretending to be FedEx, DHL, Correos, and Chrome applications and compels unsuspecting users to alter the accessibility configurations on their devices in order to maintain continuous presence on devices.”

He advised that Nigerians take precautions to avoid falling victim to the attack.

“Do not click on the link if you receive a suspicious text message, and do not install any app or security update the page asks you to install,” he said. “Use updated antivirus software that detects and prevents malware infections.

READ ALSO: Vaccine Hesitancy – The Pfizer Kano Case

“Apply critical patches to the system and application. Use strong passwords and enable two-factor authentication (2FA) over logins.

“Back-up your data regularly. If you have been affected by this campaign, you should reset your device to factory mode as soon as possible. This will delete any data on your phone, including personal data.

“Do not restore from backups created after installing the app. You may contact ngCERT on [email protected] for technical assistance. You will also need to change the passwords to all of your online accounts with urgency around your online bank accounts.

“If you have concerns that your accounts may have been accessed by unauthorised people, contact your bank immediately.”

Flubot reportedly surfaced in Spain in December 2020, and has since attacked various European countries and the USA.

For now, downloading applications from the Google Playstore appears to be the best way to avoid the malware, and running a factory reset erases it from an affected device, according to a report.

Leave a Reply

Your email address will not be published. Required fields are marked *


Published 23rd Oct, 2021

By Daniel Ojukwu

Advertisement

Our Stories

Okuama Resident Who Said Slain Soldiers Were Not for Peacekeeping on Army’s Wanted List

Month-Long Power Outage Forces UCH Doctors to Perform Surgeries With Phone Lights

Army Names 8 People Wanted for Okuama Massacre

LP Reserves 2027 Presidential Ticket for Obi

‘For His Disability, KFC Humiliates Ex-Governor Gbenga Daniel’s Son at Lagos Airport’

Jail

Lagos Resident Sentenced to Life Imprisonment for Sexually Assaulting 5-Year-Old

JUST IN: Despite Opposition, LP Re-Elects Julius Abure as Chairman

Overland Airways

Overland Airways Refunds Lawyer’s N348,000 After FIJ’s Story

Naira

Naira Gains Value, Exchanges for N900 Per Dollar in Lagos

From 1.7m Barrels to 1.4m, How Nigeria’s Daily Crude Oil Production Declined in 6 Years

Advertisement