Skip to content

Beware: ‘FluBot’ malware targets Nigerians’ Android devices to steal financial data

Beware: 'FluBot' malware targets Nigerians' Android devices to steal financial data

The Nigerian Communications Commission (NCC) has warned the public of a new malware designed to steal credit card and online banking details from devices.

In a press statement released on Friday, the NCC alerted telecom consumers about the ‘FluBot’ malware, which the Nigeria Computer Emergency Response Team (ngCERT) reported to be targeting Android devices.

How the ‘FluBot’ malware works

NCC director of public affairs Ikechukwu Adinde said that ‘FluBot’ impersonates mobile banking apps to steal people’s personal and financial data, and may also pretend to be a FedEx, DHL, Correos, or Chrome application.

The malware, which is being circulated through SMS, can snoop on the phone’s incoming notifications, initiate calls, read and write text messages and transmit the contact list in the device to its control center. 

“The new malware undermines the security of devices by copying fake login screens of prominent banks, and the moment the users enter their login details on the fake pages, their data is harvested and transmitted to the malware operators’ control point from where the data is exploited by intercepting banking-related One Time Passwords (OTPs) and replacing the default SMS app on the targeted Android device,” the  NCC statement read, according to The Cable. <…> “Consequently, it secures admittance into the device through SMS and proceeds to transmit similar messages to other contacts that may be on the device it has attacked enticing them into downloading the fake app.”

The NCC added that the malware compels phone users to change the accessibility settings on their devices. It may also create a backdoor that will give its creators access to compromised devices, further enabling them to commit other illicit acts such as launching new variants of the malware. 

Security tips

The commission advised the public to observe precautions when using their devices. It warned users not to click links from suspicious text messages.

Phone users are also encouraged to have updated antivirus software, use strong passwords and enable two-factor authentication logins, as well as apply critical patches to their systems. 

Those whose phones have already been compromised by the malware can reset their devices to factory setting and change the passwords they use in their online accounts. 

[coinbase]

Best Crypto Exchange for Intermediate Traders and Investors

  • Invest in cryptocurrencies and 3,000+ other assets including stocks and precious metals.

  • 0% commission on stocks - buy in bulk or just a fraction from as little as $10. Other fees apply. For more information, visit etoro.com/trading/fees.

  • Copy top-performing traders in real time, automatically.

  • eToro USA is registered with FINRA for securities trading.

30+ million Users
Securities trading offered by eToro USA Securities, Inc. (“the BD”), member of FINRA and SIPC. Cryptocurrency offered by eToro USA LLC (“the MSB”) (NMLS: 1769299) and is not FDIC or SIPC insured. Investing involves risk, and content is provided for educational purposes only, does not imply a recommendation, and is not a guarantee of future performance. Finbold.com is not an affiliate and may be compensated if you access certain products or services offered by the MSB and/or the BD

Read Next:

Finance Digest

By subscribing you agree with Finbold T&C’s & Privacy Policy

Related posts

Sign Up

or

By submitting my information, I agree to the Privacy Policy and Terms of Service.

Already have an account? Sign In

Services

Disclaimer: The information on this website is for general informational and educational purposes only and does not constitute financial, legal, tax, or investment advice. This site does not make any financial promotions, and all content is strictly informational. By using this site, you agree to our full disclaimer and terms of use. For more information, please read our complete Global Disclaimer.