Home Community Insights NCC Warns About Xenomorph, A Malicious Software that Steals Banking Credentials

NCC Warns About Xenomorph, A Malicious Software that Steals Banking Credentials

NCC Warns About Xenomorph, A Malicious Software that Steals Banking Credentials
A computer screen with program code warning of a detected malware script program. 3d illustration

The Nigerian Communication Commission (NCC) has issued a fresh warning about a newly discovered malicious software that steals banking data from Android phones.

A statement dated February 25, 2022, signed by the Commission’s Director of Public Affairs, Dr.  Ikechukwu Adinde, said the Nigerian Communications Commission’s Computer Security Incident Response Team (CSIRT) has discovered that the newly-hatched malicious software steals users’ banking app login credentials on Android devices.

The warning underscores how incessant malware targeting financial institutions have become, as it’s not quite long the NCC issued a warning about TangleBot, another malware that also operates on Android devices via SMS.

Tekedia Mini-MBA edition 14 (June 3 – Sept 2, 2024) begins registrations; get massive discounts with early registration here.

Tekedia AI in Business Masterclass opens registrations here.

Join Tekedia Capital Syndicate and invest in Africa’s finest startups here.

According to a security advisory from the NCC CSIRT, the malicious software called “Xenomorph”, found to target 56 financial institutions from Europe, has high impact and high vulnerability rate. The main intent of this malware is to steal credentials, combined with the use of SMS and Notification interception to log-in and use potential 2-factor authentication tokens.

The NCC thus issued the guidelines below on how Android users can avoid the malware baits.

Xenomorph is propagated by an application that was slipped into Google Play store and masquerading as a legitimate application called “Fast Cleaner” ostensibly meant to clear junk, increase device speed and optimize battery. In reality, this app is only a means by which the Xenomorph Trojan could be propagated easily and efficiently.

To avoid early detection or being denied access to the PlayStore, “Fast Cleaner” was disseminated before the malware was placed on the remote server, making it hard for Google to determine that such an app is being used for malicious actions.

Once up and running on a victim’s device, Xenomorph can harvest device information and Short Messaging Service (SMS), intercept notifications and new SMS messages, perform overlay attacks, and prevent users from uninstalling it. The threat also asks for Accessibility Services privileges, which allow it to grant itself further permissions.

The CSIRT said the malware also steals victims’ banking credentials by overlaying fake login pages on top of legitimate ones. Considering that it can also intercept messages and notifications, it allows its operators to bypass SMS-based two-factor authentication and log into the victims’ accounts without alerting them.

“Xenomorph has been found to target 56 internet banking apps, 28 from Spain, 12 from Italy, 9 from Belgium, and 7 from Portugal, as well as Cryptocurrency wallets and general-purpose applications like emailing services. The Fast Cleaner app has now been removed from the Play Store but not before it garnered 50,000+ downloads,” the CSIRT security advisory asserted.

The Nigerian Communications Commission hereby wishes to advise telecom consumers to be on alert in order not to fall victim to this manipulation. Accordingly, the NCC urges telecom consumers and other Internet users, particularly those using Android-powered devices to use trusted Antivirus solutions and update them regularly to their latest definitions.

The Commission also implore consumers and other stakeholders to always update banking applications to their most recent versions.

No posts to display

Post Comment

Please enter your comment!
Please enter your name here