NewsTelecommunicationNCC Alert Public On SMS Used By Criminals

ABUJA — The Director of Public Affairs, Nigerian Communications Commission (NCC) Dr. Ikechukwu Adinde has again alerted telecommunication users of a new high-risk, critical, and Short Messaging Service-based malware, TangleBot, infecting Android mobile devices being used by criminals to defraud people.

A statement issued yesterday by the Commission said TangleBot employs more or less similar tactics as the recently-announced notorious FlutBot SMS Android malware that targets mobile devices.

The statement added that TangleBot equally gains control of the device but in a far more invasive manner than the FlutBot malware.

It noted that the immediate consequence to this is that TangleBot gains access to several different permissions when installed on a device, allowing it to eavesdrop on user communications.

“The malware then steals sensitive data stored on the device and monitors almost every user activity, including camera use, audio conversations, and location, among other things.

“Furthermore, the malware takes complete control of the targeted device, including access to banking data, and can reach the deepest recesses of the Android operating system,” the commission warned.

The NCC, therefore, urged millions of telecom consumers in Nigeria to be wary of such wiles of cyber criminals, whose intent is to defraud unsuspecting Internet users.

 “The TangleBot was made in a recent security advisory made available to the commission’s new Media and Information Security Department by the Nigerian Computer Emergency Response Team (ngCERT).

“TangleBot Android malware is installed when an unsuspecting user clicks on a malicious link disguised as COVID-19 vaccination appointment-related information in an SMS message or information about fake local power outages that are due to occur.

“The aim behind both or either of the messages (on COVID-19 or impending power outages) is to encourage potential victims to follow a link that supposedly offers detailed information.

“Once at the page, users are asked to update applications such as Adobe flash player to view the page’s content by going through nine dialogue boxes to give acceptance to different permissions that will allow the malware operators initiate the malware configuration process,” the commission said.

In order to ensure maximum protection for Internet users in the country, it said the ngCERT had offered a number of preventive measures to be taken by consumers.

These measures include an advisory to telecom consumers and other internet users to refrain from opening Uniform Resource Locators (URLs) from unknown sources while using their mobile devices.

“Additionally, telecom consumers should never respond or send reply to messages or call back a phone number that is associated with the text that they are unaware of. Should any telecom consumer or internet user become curious and wish to ascertain the authenticity of any call or messages and wish to probe the incident, such persons may do a web search of both the number and the message content.

“The NCC hereby reiterates that mobile users are under obligation to practice safe messaging practices and avoid clicking on any links in texts, even if they appear to come from a legitimate contact. Indeed, it is important to be judicious when downloading apps by reading install prompts closely, looking out for information regarding rights and privileges that the app may request,” the commission said.

Other risk-mitigating measures advised by ngCERT are for users to be cautious of procuring any software from outside a certified app store.

The NCC said further that it is safer to call the company directly rather than using the phone number on the message received, especially if the message is spoofing a company.

Hassan Umar Shallpella (Regional Correspondent)

Leave a Reply

Your email address will not be published. Required fields are marked *

WP2Social Auto Publish Powered By :