In a recent report from the Punch News, the Nigerian Communication Commission (NCC) has gotten wind of a new high-risk and damaging malware known as Flubot which is targeting Android users in Nigeria. This information was revealed in a statement signed by the Director, Public Affairs, Ikechukwu Adinde. The statement also read that the NCC is acting on the information received from the Nigeria Computer Emergency Response Team.
What is this malware that Nigerians should know?
Malware is the generic word used in describing a software virus which has been designed to cause significant damages or gain unauthorized access to a device. In order words, the malware (Flubot) being discussed by NCC is a malicious program designed to carry out malicious activities on an unsuspecting victim's phone or computer.
The malicious activity the Flubot could carry out on the phone of an unsuspecting victim.
According to the information revealed by NCC, this malware is capable of stealing the bank details and other important information of the user without the knowledge of the user. NCC revealed that this malware comes in form of a security update or an application installation on an Android phone, and when the user clicks on the link sent to the phone, the malware becomes installed on the phone where it starts its damaging effect.
NCC also stated that the malware attacks Android devices by pretending to be ‘FedEx, DHL, Correos, and Chrome applications’ and makes unsuspecting users to alter the accessibility configurations on their devices to maintain continuous presence on devices.
What Nigerians should be careful of in this case.
The information given by NCC on the issue of the malware should serve as a guide for Android users in Nigeria. For example, no user should be tempted to install any application with suspicious sources.
Also, unverifiable links should be avoided by users because this malware is capable of undermining the security of any android device by copying fake login screens of prominent banks. It allows the user to enter their login details on the fake pages, then harvest and transmit their data to the malware operators’ control point. So, it is important that users know the link they are clicking just before they click it.
Content created and supplied by: Eltosdelights (via Opera News )
Opera News is a free to use platform and the views and opinions expressed herein are solely those of the author and do not represent, reflect or express the views of Opera News. Any/all written content and images displayed are provided by the blogger/author, appear herein as submitted by the blogger/author and are unedited by Opera News. Opera News does not consent to nor does it condone the posting of any content that violates the rights (including the copyrights) of any third party, nor content that may malign, inter alia, any religion, ethnic group, organization, gender, company, or individual. Opera News furthermore does not condone the use of our platform for the purposes encouraging/endorsing hate speech, violation of human rights and/or utterances of a defamatory nature. If the content contained herein violates any of your rights, including those of copyright, and/or violates any the above mentioned factors, you are requested to immediately notify us using via the following email address operanews-external(at)opera.com and/or report the article using the available reporting functionality built into our Platform See More