×
Our website is made possible by displaying online advertisements to our visitors. Please consider supporting us by whitelisting our website.

NCC-CSRT warns as Schoolyard Bully malware hits over 300,000 devices

starconnect
Schoolyard Bully on the prowl, NCC warns

Tells users to download only apps from official sites, stores

 

Admin l Friday, December 16, 2022

 

ABUJA, Nigeria – A malware that steals Facebook account credentials, known as “Schoolyard Bully”, has infected over 300,000 android devices, prompting the Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) to issue an advisory reminding user to only download applications from official sites and application stores.

The NCC-CSIRT advisory in this regard further recommended that users double-check each application and uncheck boxes that request extra third-party downloads when installing apps downloaded from the Google Play Store and to use anti-malware applications to routinely scan their devices for malware.

Researchers from mobile security firm, Zimperium, found several apps that transmit the “Schoolyard Bully” malware while disguising themselves as reading and educational apps with a variety of books and topics for their victims to study.

The malicious apps were available on Google Play, yet they have already been taken down. However, they still spread via third-party Android app shops.

Advertisement

The primary objective of the malware, which affects all versions of Facebook Apps for Android, is to steal Facebook account information, including the email address and password, account ID, username, device name, device RAM (Random Access Memory), and device API (Application Programming Interface).

According to NCC-CSIRT, “The (Zimperium) research stated that the malware employs JavaScript injection to steal the Facebook login information. The malware loads a legitimate URL (web address) inside a WebView (a WebView maps website elements that enables user interaction through Android View objects and their extensions) with malicious JavaScript injected to obtain the user’s contact information (phone number, email address, and password), then send it to the command-and-control server.

Furthermore, malware uses native libraries to evade detection and analysis by security software and machine learning technologies.”

The CSIRT is the telecom sector’s cyber security incidence centre set up by the NCC to focus on incidents in the telecom sector and as they may affect telecom consumers and citizens at large.

The CSIRT also works collaboratively with ngCERT, established by the Federal Government to reduce the volume of future computer risk incidents by preparing, protecting, and securing Nigerian cyberspace to forestall attacks, and problems or related events.

TAGGED:
Share this Article
Leave a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Exit mobile version
Be the first to get the news as soon as it breaks Yes!! I'm in Not Yet