• Hausa Edition
  • Podcast
  • Conferences
  • LeVogue Magazine
  • Business News
  • Print Advert Rates
  • Online Advert Rates
  • Contact Us
Tuesday, October 28, 2025
Leadership Newspapers
Read in Hausa
  • Home
  • News
  • Politics
  • Business
  • Sport
    • Football
  • Health
  • Entertainment
  • Education
  • Opinion
    • Editorial
    • Columns
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us
No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Sport
    • Football
  • Health
  • Entertainment
  • Education
  • Opinion
    • Editorial
    • Columns
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us
No Result
View All Result
Leadership Newspapers
No Result
View All Result

NCC Alerts About Malware Attacks On Bank Accounts, Others

by Innocent Odoh
3 years ago
in Business
NCC
Share on WhatsAppShare on FacebookShare on XTelegram

A malware,  Xenomorph, that installs Trojan in banking apps on the Android platform to steal login details, raid bank accounts,  and read the users SMS, has been flagged by the Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT).

Advertisement

This warning was contained in a statement issued yesterday by the Director of Public Affairs of the NCC, Reuben Mouka, which advised that owners of compromised devices take the extreme measure of doing factory resetting of infected devices.

NCC-CSIRT, citing Zscaler ThreatLabz, said, “The Todo: Day Manager hijacks your login info from banking apps, and can even read your SMS messages. It installs a banking trojan malware called Xenomorph that allows the app to intercept your two-factor verification codes (typically delivered over text) to raid your logins – and bank account.

Advertisement

“Xenomorph performs overlay attacks by exploiting accessibility permissions in Android, resulting in the overlaying of fraudulent login screens on banking apps aimed at exfiltrating credentials. The Android app makes itself intentionally difficult to delete. You need to search your phone for it immediately and uninstall it.”

“It starts with asking users to enable access permission. Once provided, it adds itself as a device admin and prevents users from disabling Device Admin, making it un-installable from the phone.

you haven’t given permission to the app, then you should be able to uninstall it safely. Otherwise, you may have to back up your files and then factory-reset your phone to clear the app completely,” it advised.

RELATED NEWS

GIDI IARC 2025: Experts Seek Accountability, Transparency in Africa’s Property Market

FirstBank Redeems $350m Eurobond, Demonstrates Strong Liability Management

Petralon 54 Inaugurates Community Development Trusts For Dawes-Island In Rivers

Oyedele To Deliver Keynote Address At Haulmace 10th Anniversary

In terms of potential solutions to the malware, NCC-CSIRT advised that “Search your phone for the app and uninstall immediately or backup your files and factory reset your phone.

“Only search for an app in the Google Play Store, pay close attention to the search results, look at the apps icons, note that fake apps almost always use the icon from the app they’re faking, then look at the developer’s name and make sure it’s from the right developer.

Also, look at the app’s download count. If the app has a lot of downloads going into millions to hundreds of thousand that’s a clue that it’s the right app.  Then, finally, look at the app’s description and screenshots to ensure that it doesn’t contain multiple spelling or grammar mistakes or otherwise broken English.

“Make use of Google Play Protect, which regularly scans your apps for malware and will alert you to uninstall rogue apps.”

The CSIRT is the telecom sector’s cyber security incidence centre set up by the NCC to focus on incidents in the telecom sector and as they may affect telecom consumers and citizens at large.

The CSIRT also works collaboratively with Nigeria Cybersecurity Emergency Response Team (ngCERT), established by the Federal Government to reduce the volume of future computer risk incidents by preparing, protecting, and securing Nigerian cyberspace to forestall attacks, and problems or related events.

 

Join Our WhatsApp Channel


SendShareTweetShare

OTHER NEWS UPDATES

GIDI IARC 2025: Experts Seek Accountability, Transparency in Africa’s Property Market
Business

GIDI IARC 2025: Experts Seek Accountability, Transparency in Africa’s Property Market

7 hours ago
FirstBank Redeems $350m Eurobond, Demonstrates Strong Liability Management
Business

FirstBank Redeems $350m Eurobond, Demonstrates Strong Liability Management

10 hours ago
Petralon 54 Inaugurates Community Development Trusts For Dawes-Island In Rivers
Business

Petralon 54 Inaugurates Community Development Trusts For Dawes-Island In Rivers

12 hours ago
Advertisement
Leadership join WhatsApp

LATEST UPDATE

Netizen Raises Alarm Over Broad Daylight Theft Of Fibre Optic Cables Along Kaduna Highway

2 hours ago

Tinubu Hosts Denmark’s Richest Man Povlsen

2 hours ago

Policeman, District Head’s Son Killed In Gombe Farmers-Herders Clash

2 hours ago

Hurricane Melissa Hits Jamaica With 185 mph Winds

2 hours ago

2Baba Celebrates 25 Years In Music, Reflects On Journey So Far

3 hours ago
Load More

© 2025 Leadership Media Group - All Rights Reserved.

No Result
View All Result
  • Home
  • News
  • Politics
  • Business
  • Sport
    • Football
  • Health
  • Entertainment
  • Education
  • Opinion
    • Editorial
    • Columns
  • Others
    • LeVogue Magazine
    • Conferences
    • National Economy
  • Contact Us

© 2025 Leadership Media Group - All Rights Reserved.