• Cryptocurrency
  • Earnings
  • Enterprise
  • About TechBooky
  • Submit Article
  • Advertise Here
  • Contact Us
TechBooky
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • AI
  • Metaverse
  • Gadgets
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
TechBooky
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Home Security

The NCC Says Xenomorph Malware Can Steal Your Banking Info, Here’s What To Know.

The NCC Computer Security Incident Response Team leads the investigation

Paul Balo by Paul Balo
March 1, 2022
in Security
Share on FacebookShare on Twitter

The internet infrastructure community is prone to cyber-attacks and that is where cyber security is indulged to play a vital role in this field. The Nigerian Communication Commission has been responsive lately with dealing with possible Trojan-like viruses dubbed Xenomorph malware.

The NCC’s Computer Security Incident Response Team discovers malicious software programmed to steal Nigerians’ personal information with stealth for further illicit activity.

The NCC’s Computer Security Incident Response Team has prioritized the processes in which this software programmed and dubbed it the ‘Xenomorph’ attack. This malware is built to penetrate the Android OS firewall to copy bank credentials and other sensitive credentials processed in the smartphone.

The NCC’s Computer Security Incident Response Team discovered the vulnerability of Android OS and said that it is prone to the Xenomorph malware. Recall several cyberattacks on the European financial market when multiple financial institutions got robbed of cash via digital penetrations.

The Nigerian commission discovered the malware per the unprecedented Xenomorph trends from overseas — with Android users as its primary targets.

It is worth noting that these financial institutions utilize high-end technology applications, yet they got mugged by the Xenomorph. Once the malware gets its way into the Android device, Xenomorph intercepts notifications then filters the bank credentials and other sensitive credentials paired with an in-built SMS app.

The Android OS vulnerability to the Xenomorph attack also breaches the two-factor authentication system. Recall the malware is programmed to intercept notification likewise breaching the two-factor authentication token. The malware is designed for the Android OS — the NCC did not disclose the Xenomorph responsiveness to the iOS platform.

“In reality, this app is only a means by which the Xenomorph Trojan could be propagated easily and efficiently. To avoid early detection or being denied access to the PlayStore, ‘Fast Cleaner’ was disseminated before the malware was placed on the remote server, making it hard for Google to determine that such an app is being used for malicious actions,” Danbatta said.

“Once up and running on a victim’s device, Xenomorph can harvest device information and Short Messaging Service, intercept notifications and new SMS messages, perform overlay attacks, and prevent users from uninstalling it.” The malware invaded the supplier of Android apps, the Google Play Store. “The threat also asks for Accessibility Services privileges, which allow it to grant itself further permissions.”

The Xenomorph malware is disguised as a regular app in Google’s app world christened ‘Fast Cleaner’ — this app is meant to optimize the Android device and clear junks that enhance the battery life. Several Nigerians have reportedly installed the app on their smartphones, including the regular African population.

For context, the Fast Cleaner boosters the Android device’s speed, it also invades its users’ finance and steals funds. The NCC revealed the Xenomorph attacks by stealth to replicate users’ bank credentials — to the extent of intercepting a two-factor authentication token.

The NCC has records of several victims of the Xenomorph malware — it camouflages on the login page of bank apps — the administrator of the malware can retrieve the 2FA tokens because the Xenomorph activity is synced with the same Android device.

Still, the Computer Security Incident Response Team did not reveal how the Xenomorph malware responds to the iOS platform. This explains how certified iOS security is not vulnerable to Xenomorph malware.

The Fast Cleaner is active in the Apple App Store — is the iPhone vulnerable to the Xenomorph malware? This is a non-rhetoric question the NCC should publish a report.

The Xenomorph malware can also hack your digital wallets, including a digital currency saved in a decentralized network. In sum, this is a priority warning to Android users optimizing their device with Fast Cleaner should stop and delete every trace of the app, Techbooky writes.

Related Posts:

  • handala hackers
    FBI Warns of Handala Hackers Using Telegram for Malware
  • blog-a-lurking-npm-package
    Malicious npm Package Compromises WhatsApp Accounts
  • Copy-of-Blue-Modern-Gradient-Beauty-And-Fashion-Blog-Banner-2024-07-10T161619.685
    Kenya Reports 2.54 Billion Cyber Threats in Q1 of 2025
  • vercel-2249343327_f343ad
    Vercel Admits To Customer Data Been Stolen Before…
  • Test.e531c24e977be870325a
    CAC Experiences Data Breach, Users Advised To Reset…
  • Top_Cybersecurity_Projects
    Cybersecurity Projects for Both beginners and Experts
  • 1280px-amazon_web_services_logo.svg_-1024x613
    European Commission Probes Cloud Breach After Hacker…
  • Robotics
    Nigeria Ranked As Africa’s Second Most Cyber-secure…

Discover more from TechBooky

Subscribe to get the latest posts sent to your email.

Tags: androidcyber attackcyber securitymalwarenccXenomorph
Paul Balo

Paul Balo

Paul Balo is the founder of TechBooky and a highly skilled wireless communications professional with a strong background in cloud computing, offering extensive experience in designing, implementing, and managing wireless communication systems.

BROWSE BY CATEGORIES

Receive top tech news directly in your inbox

subscription from
Loading

Freshly Squeezed

  • Trump-Linked Crypto Push Faces Lawsuit, Ethics Fight and Market Setbacks May 3, 2026
  • OpenAI Ignored Employee Warnings Before ChatGPT-Linked Shooting, Report Says May 3, 2026
  • NGX Q1 profit jumps 94% as trading-fee income soars 189% May 3, 2026
  • AI Beats Doctors in Harvard ER Study, Showing Major Shift in Healthcare May 3, 2026
  • Meta Acquires Robotics Startup To Boost & Improve Its Humanoid AI Efforts May 2, 2026
  • xAI Rolls out Grok 4.3 and a New Voice Cloning Suite May 2, 2026
  • Pentagon Taps Nvidia, Microsoft And AWS To Bring AI To Classified Networks May 1, 2026
  • Hackers Are Exploiting Critical cPanel Bug, Putting Millions of Websites at Risk May 1, 2026
  • Alibaba’s Metis Agent Aims to Fix ‘Trigger‑Happy’ AI Tool Use With New RL Framework May 1, 2026
  • Samsung Q1 2026 Earnings: Record Profit Driven by AI Memory Chip Boom May 1, 2026
  • Qualcomm Q1 2026 Earnings: China Weakness and AI Push Drive Mixed Results May 1, 2026
  • Amazon Q1 2026 Earnings: AWS and AI Drive Strong Growth Despite Spending Concerns May 1, 2026

Browse Archives

May 2026
MTWTFSS
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Quick Links

  • About TechBooky
  • Advertise Here
  • Contact us
  • Submit Article
  • Privacy Policy
Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
  • African
  • Artificial Intelligence
  • Gadgets
  • Metaverse
  • Tips
  • AI Search
  • About TechBooky
  • Advertise Here
  • Submit Article
  • Contact us

© 2025 Designed By TechBooky Elite

Discover more from TechBooky

Subscribe now to keep reading and get access to the full archive.

Continue reading

We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.