Digital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Facebook X (Twitter) Instagram
Trending
  • Egeonu Tenders Public Apology To Governor Otti Over December Facebook Publication
  • Agbata Celebrates Governor Soludo At 65, Hails Impactful Tech-Driven Leadership
  • NIMC Warns Nigerians Against Selling NIN Data
  • NITRA-ALTON CNII & Sustainability Conference Now Holds August 7
  • Ejime Wins ECOWAS Maiden Journalist Excellence Award
  • Diaspora Alumni’s Role In Nigeria’s Socio-Economic Development Tops Agenda At UNIZIK UK Alumni Reunion
  • Google Announces $37 Million AI Investment To Advance Africa’s Research, Talent, And Food Security
  • Anambra’s Digital Leap: GEFAS Mobile Tech Hub Hits The Road With Free WiFi Access
Facebook X (Twitter) Instagram
Digital Times NigeriaDigital Times Nigeria
  • Home
  • Telecoms
    • Broadband
  • Business
    • Banking
    • Finance
  • Editorial
    • Opinion
    • Big Story
  • TechExtra
    • Fintech
    • Innovation
  • Interview
  • Media
    • Social
    • Broadcasting
Digital Times Nigeria
Home » NCC Alerts Of New Malware, AbstractEmu, Attacking Android Devices
Telecoms

NCC Alerts Of New Malware, AbstractEmu, Attacking Android Devices

Our REPORTERBy Our REPORTER11 November 2021No Comments4 Mins Read
Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
NCC NEW 2
Share
Facebook Twitter LinkedIn Pinterest Telegram Email WhatsApp

The Nigerian Communications Commission (NCC) has alerted telecom consumers and the general public of the discovery of new Android malware.

The malware, named ‘AbstractEmu’, can gain access to smartphones, take complete control of infected smartphones and silently modify device settings while simultaneously taking steps to evade detection.

The NCC said in a statement signed by the Director, Public Affairs, Dr. Ikechukwu Adinde that this discovery was announced recently by the Nigerian Computer Emergency Response Team (ngCERT), the national agency established by the Federal Government to manage the risks of cyber threats in Nigeria, which also coordinates incident response and mitigation strategies to proactively prevent cyber-attacks against Nigeria

AbstractEmu has been found to be distributed via Google Play Store and third-party stores such as the Amazon Appstore and the Samsung Galaxy Store, as well as other lesser-known marketplaces like Aptoide and APKPure.

The advisory stated that a total of 19 Android applications that posed as utility apps and system tools like password managers, money managers, app launchers, and data saving apps have been reported to contain the rooting functionality of the malware.

The apps are said to have been prominently distributed via third-party stores such as the Amazon Appstore and the Samsung Galaxy Store, as well as other lesser-known marketplaces like Aptoide and APKPure.

The apps include All Passwords, Anti-ads Browser, Data Saver, Lite Launcher, My Phone, Night Light and Phone Plus, among others.

According to the report, rooting malware although rare, is very dangerous. By using the rooting process to gain privileged access to the Android operating system, the threat actor can silently grant itself dangerous permissions or install additional malware – steps that would normally require user interaction.

READ ALSO  Telecoms Sector Amongst Biggest Contributors To Nigeria’s Socio-Economic Growth- Danbatta

Elevated privileges also give the malware access to other apps’ sensitive data, something not possible under normal circumstances.

The ngCERT advisory also captured the consequences of making their devices susceptible to AbstractEmu attacks. Once installed, the attack chain is designed to leverage one of five exploits for older Android security flaws that would allow it to gain root permissions.

It also takes over the device, installs additional malware, extracts sensitive data,  and transmits to a remote attack-controlled server.

Additionally, the malware can modify the phone settings to give the app the ability to reset the device password, or lock the device, through device admin; draw over other windows; install other packages; access accessibility services, and ignore battery optimization.

The malware also monitors notifications; captures screenshots; records device screen; disables Google Play Protect; as well as modifies permissions that grant access to contacts, call logs, Short Messaging Service (SMS), Geographic Positioning System (GPS), camera, and microphone.

The ngCERT also asserts in the advisory that, while the malicious apps were removed from Google Play Store, the other app stores are likely distributing them.

Consequently, the NCC wishes to reiterate a two-fold ngCERT advisory in order to mitigate the risks. The two-fold advisory include:

-Users should be wary of installing unknown or unusual apps, and look out for different behaviours as they use their phones.

-Reset your phone to factory settings when there is suspicion of unusual behaviours in your phone.

“The NCC, in exercise of its mandate and obligation to the consumers, will continue to sensitise and educate telecoms consumers on any cyber threat capable of inflicting low or high-impact harms on their devices, whether discovered through the ngCERT or the telecom sector’s Centre for Computer Security Incident Response managed by the Commission,” the statement read.

READ ALSO  Danbatta Reveals How NCC Has Committed Over N200m To Research & Development

Recall that the NCC, in October 2021, alerted telecom consumers of the existence of new, high-risk and extremely-damaging, Android device-targeting Malware called Flubot and outlined steps to prevent their devices from being attacked by the virus.

 

#AbstractEmu #Android Devices #Cybercrime #Malware NCC
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleMainOne Upgrades VIPNET’s Capacity
Next Article Akinfeleye Seeks Urgent Review Of NBC Code
Our REPORTER
  • Website

Related Posts

Airtel Africa Delivers Strong First Quarter Results As Customer Base And Mobile Money Surge

25 July 2025

Smile Communications Kicks Off “#AllTimeSmileTime” Campaign To Celebrate Internet Access Anytime, Anywhere

21 July 2025

NCC Unveils General Authorisation Framework To Drive Telecom Innovation And Inclusivity

18 July 2025

Telecom Operators Raise Alarm Over Rising Vandalism Threatening Nigeria’s Communications Infrastructure

18 July 2025

Telecom Security In Focus As NITRA, ALTON Host National Forum On CNII And Sustainability

2 July 2025

ALTON Blames NIMC Migration For Nationwide Disruption Of SIM Services

2 July 2025

Comments are closed.

Categories
About
About

Digital Times Nigeria (www.digitaltimesng.com) is an online technology publication of Digital Times Media Services.

Facebook X (Twitter) Instagram
Latest Posts

Egeonu Tenders Public Apology To Governor Otti Over December Facebook Publication

28 July 2025

Agbata Celebrates Governor Soludo At 65, Hails Impactful Tech-Driven Leadership

28 July 2025

NIMC Warns Nigerians Against Selling NIN Data

28 July 2025
Popular Posts

Building Explainable AI (XAI) Dashboards For Non-Technical Stakeholders

2 May 2022

Building Ethical AI Starts With People: How Gabriel Ayodele Is Engineering Trust Through Mentorship

8 January 2024

Gabriel Tosin Ayodele: Leading AI-Powered Innovation In Web3

8 November 2022
© 2025 Digital Times NG. Designed by Max Excellence LLC.
  • Advert Rate
  • Terms of Use
  • Advertisement
  • Private Policy
  • Contact Us

Type above and press Enter to search. Press Esc to cancel.