By using this site, you agree to the Privacy Policy and Terms & Conditions.
Accept
Okay.ngOkay.ngOkay.ng
Font ResizerAa
  • News
    • Politics
  • Entertainment
  • Business & Economy
  • Sport
  • Tech
Reading: NCC alerts telecoms consumers about new malware attacking Android devices
Share
Font ResizerAa
Okay.ngOkay.ng
  • News
  • Entertainment
  • Business & Economy
  • Sport
  • Tech
Search
  • News
    • Politics
  • Entertainment
  • Business & Economy
  • Sport
  • Tech
Follow US
  • About Okay.ng
  • Advertising on Okay.ng
  • Contact Okay.ng
  • Careers
  • Meet the Team behind Okay.ng
  • Ownership and Funding of Okay.ng
  • Editorial Principles at Okay.ng
© OKN MEDIA PUBLISHING 2022 - All rights reserved
Tech

NCC alerts telecoms consumers about new malware attacking Android devices

Muhammad A. Aliyu
By Muhammad A. Aliyu
Published: November 9, 2021
Share
5 Min Read
AbstractEmu
AbstractEmu
SHARE

The Nigerian Communications Commission (NCC), has warned Nigerian telecom consumers to beware of new malware named, AbstractEmu.

The NCC disclosed this in a statement titled ‘Cybercrime: NCC Reports new Malware AbstractEmu, attacking Android Devices’, which was signed by Dr Ikechukwu Adinde, its Director of Public Affairs, on Wednesday.

It reads: “The Nigerian Communications Commission (NCC) wishes to inform telecom consumers and the general public that a new Android malware has been discovered.

“The malware, named ‘AbstractEmu’, can gain access to smartphones, take complete control of infected smartphones and silently modify device settings while simultaneously taking steps to evade detection.

- Advertisement -

“This discovery was announced recently by the Nigerian Computer Emergency Response Team (ngCERT), the national agency established by the Federal Government to manage the risks of cyber threats in the Nigeria, which also coordinates incident response and mitigation strategies to proactively prevent cyber-attacks against Nigeria

“AbstractEmu has been found to be distributed via Google Play Store and third-party stores such as the Amazon Appstore and the Samsung Galaxy Store, as well as other lesser-known marketplaces like Aptoide and APKPure.

“The advisory stated that a total of 19 Android applications that posed as utility apps and system tools like password managers, money managers, app launchers, and data saving apps have been reported to contain the rooting functionality of the malware.

“The apps are said to have been prominently distributed via third-party stores such as the Amazon Appstore and the Samsung Galaxy Store, as well as other lesser-known marketplaces like Aptoide and APKPure. The apps include All Passwords, Anti-ads Browser, Data Saver, Lite Launcher, My Phone, Night Light and Phone Plus, among others.

- Advertisement -

“According to the report, rooting malware although rare, is very dangerous. By using the rooting process to gain privileged access to the Android operating system, the threat actor can silently grant itself dangerous permissions or install additional malware – steps that would normally require user interaction. Elevated privileges also give the malware access to other apps’ sensitive data, something not possible under normal circumstances.

“The ngCERT advisory also captured the consequences of making their devices susceptible to AbstractEmu attack. Once installed, the attack chain is designed to leverage one of five exploits for older Android security flaws that would allow it to gain root permissions. It also takes over the device, installs additional malware, extracts sensitive data, and transmits to a remote attack-controlled server.

“Additionally, the malware can modify the phone settings to give app ability to reset the device password, or lock the device, through device admin; draw over other windows; install other packages; access accessibility services; ignore battery optimisation; monitor notifications; capture screenshots; record device screen; disable Google Play Protect; as well as modify permissions that grant access to contacts, call logs, Short Messaging Service (SMS), Geographic Positioning System (GPS), camera, and microphone.

“The ngCERT also asserts in the advisory that, while the malicious apps were removed from Google Play Store, the other app stores are likely distributing them. Consequently, the NCC wishes to reiterate a two-fold ngCERT advisory in order to mitigate the risks. The two-fold advisory include:

  1. Users should be wary of installing unknown or unusual apps, and look out for different behaviours as they use their phones.
  2. Reset your phone to factory settings when there is suspicion of unusual behaviours in your phone.

“The NCC, in exercise of its mandate and obligation to the consumers, will continue to sensitise and educate telecoms consumers on any cyber threat capable of inflicting low or high-impact harms on their devices, whether discovered through the ngCERT or the telecom sector’s Centre for Computer Security Incident Response managed by the Commission.

“It will be recalled that the NCC, in October 2021, alerted telecom consumers of the existence of new, high-risk and extremely-damaging, Android device-targeting Malware called Flubot and outlined steps to prevent the eir devices from being attacked by the virus.“

Stay Updated on the Go with Our Latest News—Join Our WhatsApp Channel Now!
TAGGED:AbstractEmuNCC
Share This Article
Facebook Whatsapp Whatsapp Telegram Email Copy Link Print
ByMuhammad A. Aliyu
Follow:
Muhammad Ameer Aliyu, is a prolific journalist who joined Okay Nigeria in 2015 with the aim staying committed to bringing more positive growth to the digital news platform. He is the Senior Editor at Okay Nigeria.
Previous Article Mallam Mele Kyari Kyari has transformed NNPC, says PPRAC as GMD wins Zik Leadership Award
Next Article Meta launches Business Coach tool on WhatsApp to help SMBs learn more about growth Meta launches Business Coach tool on WhatsApp to help SMBs learn more about growth

Connect with Okay on Social

FacebookLike
XFollow
InstagramFollow
TelegramFollow

Dollar/Naira Rates

Dollar to Naira Exchange Rate

Okay.ng Logo
Buy Rate ₦1,605.00
Sell Rate ₦1,620.00

Last updated: 1 day ago (June 3, 2025 2:33 pm)

Displayed rates are for informational purposes only and are subject to change.

USD/NGN Converter

- Advertisement -
- Advertisement -
Ad imageAd image
- Advertisement -
Ad imageAd image

Recent Posts

Spotify
Spotify Launches Masterclass to Combat Artificial Streaming and Protect Real Artists
Entertainment
TikTok
TikTok Unveils New Tools to Help Nigerians Customise Their For You Feed Experience
Tech
Pastor Tunde Bakare Meets President Tinubu in Lagos, Discusses Nigeria’s Future and National Development
News Top stories
Olusegun Obasanjo
Obasanjo Highlights Disinformation’s Impact on Nigerian Civil War at AWCN Symposium
News
EFCC Expands Hunt: Two More Suspects Declared Wanted in CBEX Fraud Case
News Top stories
- Advertisement -
Ad imageAd image

You May Also Like

Entertainment

Nasboi Survives Car Accident Amid Davido Collaboration Quest

Oluwadara Akingbohungbe
Oluwadara Akingbohungbe
June 4, 2025
Crime

Rivers Police Arrest Bicycle-Riding Car Snatcher Possessing Seven Master Keys

Oluwadara Akingbohungbe
Oluwadara Akingbohungbe
June 4, 2025
News

Senator Barau Jibrin Donates N22 Million to Bereaved Families of Kano Athletes in Heartfelt Condolence Visit

Oluwadara Akingbohungbe
Oluwadara Akingbohungbe
June 4, 2025
Okay.ngOkay.ng
Follow US
© OKN MEDIA PUBLISHING 2025 - All rights reserved
  • About Okay.ng
  • Advertising on Okay.ng
  • Contact Okay.ng
  • Careers
  • Meet the Team behind Okay.ng
  • Ownership and Funding of Okay.ng
  • Editorial Principles at Okay.ng
adbanner
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?