NCC-CSIRT issues advisories against threat actors  

NCC-CSIRT issues advisories against threat actors  

The Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has rolled out advisories against cyber threat actors, who continue to devise means of compromising their targets.

Reuben Muoka, Director, Public Affairs at NCC said, in a statement, the advisory is in line with the NCC-CSIRT’s mandate.

The latest of such advisories urged users to be mindful of attackers using Microsoft OneNote attachments in phishing emails.

Such attachments infect victims with remote access malware, which may allow hackers to remotely access vital information on victims’ devices.

The NCC-CSIRT team, therefore, advised users not open files from people they do not know.

It asked people not to click ‘OK’ but should immediately exit the application.

That is, if they receive warning that opening an attachment or link can damage their computer or files.

It also advised users to promptly share an unknown email, they believe to be genuine, with security or Windows administrator.

They should do this to seek assistance in determining whether the file is secure.

NCC-CSIRT recently advised people not to open attachments in suspicious emails.

It asked them to only buy or download applications from official websites.

The advice was in response to the discovery of phishing malware that can gain unauthorised access to sensitive user data and download further malware.

The team reported that cybersecurity analysts at ASEC (South Korea’s cybersecurity emergency response centre), discovered NetSupport RAT malware being distributed by threat actors from a phishing website.

Read Related News:

Fintech player commends NCC at AfricaNXT 2023 Show

NCC renews agreement with Lottery Commission

Hackers attack Twitter, exposing data of 200m users

The malware disguises itself as a popular Pokemon card game.

It is a remote access tool that easily controls its victims’ Personal Computers and may allow the attackers to remotely control the compromised computer’s mouse and keyboard.

it can also access the system’s file management and history and even execute commands allowing them to install additional malware.

According to a researcher, the crafted website that spread the malware is still online.

“It claims to be home to a new NFT card game built around the Pokemon franchise, offering users strategic fun together with NFT investment profits,” the statement added.

In a related advisory, following the discovery of several phishing apps on the Google Play Store, NCC-CSIRT had also advised users not to give out sensitive information through untrusted platforms.

NCC-CSIRT said the apps, downloaded 450,000 times, can be games or investment services.

They designed there apps to steal sensitive user information.

“While we have removed some of the malicious apps, others are still active on the store.

“The affected apps are Golden Hunt, Reflector, Seven Golden Wolf Blackjack, Unlimited Score, Big Decisions and Jewel Sea.

“Others include Lux Fruits Game, Lucky Clover, King Blitz, and Lucky Hammer.”

According to the advisory, after installing and opening the app, it will contact a remote server, which will reply with instructions on what to do.

These instructions typically include phishing pages that will be displayed to unsuspecting users to collect their sensitive information.




Do you have a flair for Citizenship Journalism? Share story(ies) of happenings in your area with The NewsZenith on WhatsApp: 08033668669 or

Leave a Reply

Your email address will not be published. Required fields are marked *