NCC-CSIRT Issues Advisories to Protect Nigerians against Threat Actors 

Emma Okonji

The Nigerian Communications Commission (NCC), through its Computer Security Incident Response Team (NCC-CSIRT) has rolled out some advisories, as cyber threat actors continue to devise means of compromising their targets.

The latest of such advisories urged users to be mindful after attackers use Microsoft OneNote attachments in phishing emails that infect victims with remote access malware, which may allow hackers to remotely access vital information on victims’ devices.

The team advised users not to open files from people they do not know, not to click ‘OK’ and immediately exit the application if they receive a warning that opening an attachment or link can damage their computer or files and to promptly share an unknown email they believe to be genuine with a security or Windows administrator to assist in determining whether the file is secure.

It had recently advised people not to open attachments in suspicious emails and to only purchase or download applications from official websites in response to the discovery of phishing malware that could gain unauthorised access to sensitive user data and download further malware.

The team reported that cybersecurity analysts at South Korea’s cybersecurity emergency response centre, discovered a NetSupport RAT malware being distributed by threat actors from a phishing website disguised as a popular Pokemon card game. 

The malware is a remote access tool that easily controls its victims’ Personal Computers and may allow the attackers to remotely control the compromised computer’s mouse and keyboard, access the system’s file management and history and even execute commands allowing them to install additional malware. 

According to the researcher, the CRAFTED website that spread the malware is still online. It claims to be home to a new NFT card game built around the Pokemon franchise, offering users strategic fun together with NFT investment profits. 

In a related advisory, following the discovery of several phishing apps on the Google Play Store, NCC-CSIRT had also advised users not to give out sensitive information through untrusted platforms.

NCC-CSIRT’s advisory on the discovery said the apps, which have been downloaded 450, 000 times in total, can be games or investment services, but that they are designed to steal sensitive user information. 

While some of the malicious apps have been removed, others are still active on the store, with the affected apps listed as Golden Hunt, Reflector, Seven Golden Wolf Blackjack, Unlimited Score, Big Decisions, Jewel Sea, Lux Fruits Game, Lucky Clover, King Blitz, and Lucky Hammer.

According to the advisory, after installing and opening the app, it will contact a remote server which will reply with instructions on what to do. These instructions typically include phishing pages that will be displayed to unsuspecting users to collect their sensitive information.

Meanwhile, NCC-CSIRT also advised users to update their Galaxy App Store following the discovery of multiple vulnerabilities in the Samsung Galaxy App Store Application can lead to unwanted app installations and code execution. It disclosed that Ken Gannon, a cybersecurity researcher from NCC Group, discovered the vulnerabilities in the Galaxy App Store application on Samsung devices that are running Android 12 and older.

Related Articles