fbpx
Founder Institute Lagos Founder Institute Lagos Founder Institute Lagos
  • Home
  • About
  • Partners
  • Advertise
  • Contact
  • Signup to receive updates
Innovation | Startups | Funding | Tech Blog in Africa
Advertisement
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain
No Result
View All Result
Innovation | Startups | Funding | Tech Blog in Africa
No Result
View All Result
Home General

NCC-CSIRT provides Solution for Two Independently Identified Cyber Vulnerabilities

by Wale Oguntokun
2022/01/28 - Updated on 2022/03/28
in General
CSIRT - techbuild
Share on FacebookShare on Twitter

The CSIRT, in its first-ever security advisories less than three months after its creation, has solely identified the two cyber-attacks targeting the consumers and proffer solutions that can help telecom consumers from falling victims to the two cyber vulnerabilities.

The first, according to a statement signed by Dr. Ikechukwu Adinde, director, Public Affairs at NCC, is described as Juice Jacking, which can gain access into consumers’ devices when charging mobile phones at public charging stations and it applies to all mobile phones.

The other is a Facebook for Android Friend Acceptance Vulnerability, which targets only Android Operating System.

According to CSIRT security Advisory 0001 released on January 26, 2022, with Juice Jacking, attackers have found a new way to gain unauthorized entry into unsuspecting mobile phone users devices when they charge their mobile phones at public charging stations.

RelatedPosts

Inaugural DICE 2023 Tech Mixer Draws Over 250 Industry Pioneers, Igniting Tech Conversations

VC4A celebrates a Decade, pledges for 10x Early Stage Investing in Africa

Spotify Wrapped 2023: Asake, Rema, Apostle Joshua Selman top most streamed in Nigeria

TGI Group launches Women in TGI Webinar Series

Many public spaces, restaurants, malls and even in the public trains do offer complementary services to their customers in a bid to enhance customer services, one of which is providing charging ports or sockets.

However, an attacker can leverage this courtesy to load a payload in the charging station or on the cables they would leave plugged in at the stations.

Once unsuspecting persons plug their phones at the charging station or the cable left by the attacker, the payload is automatically downloaded on the victims’ phone. This payload then gives the attacker remote access to the mobile phone, allowing them to monitor data transmitted as text, or audio using the microphone.

The attacker can even watch the victim in real time if the victims’ camera is not covered. The attacker is also given full access to the gallery and also to the phone’s Global Positioning System (GPS) location.

When an attacker gains access to a user’s Mobile phone, he gets remote access to the User’s phone which leads to breach in Confidentiality, Violation of Data Integrity and bypass of Authentication Mechanisms.

Symptoms of attack may include sudden spike in battery consumption, device operating slower than usual, apps taking a long time to load, and when they load they crash frequently and cause abnormal data usage.


Don’t miss important articles during the week. Subscribe to techbuild.africa weekly digest for updates.

Join @techbuildafrica on Telegram
ShareTweetShareSendShare

Subscribe us

Recent Posts

  • Inaugural DICE 2023 Tech Mixer Draws Over 250 Industry Pioneers, Igniting Tech Conversations
  • VC4A celebrates a Decade, pledges for 10x Early Stage Investing in Africa
  • Social Entrepreneur? Apply for FINCA Ventures Prize ($100K)
  • Spotify Wrapped 2023: Asake, Rema, Apostle Joshua Selman top most streamed in Nigeria
  • AFEX announces Africa Exchange to Further Transform the Commodity Space
  • GoMetro raises £9 Million Series A Funding from Zenobē, FutureGrowth, Others
  • TGI Group launches Women in TGI Webinar Series
  • YouTube launches ‘The Voices of Africa’ to celebrate Africa’s diverse Cultural Heritage
  • ISN Hubs Welcomes Oge Nnaife as New Executive Director
  • Grey unveils New Brand Identity to drive its Global Expansion
Innovation | Startups | Funding | Tech Blog in Africa

© 2013-2021 techbuild.africa. All Rights Reserved.

Navigate Site

  • About
  • Contact
  • WE-Forum
  • Privacy
  • Sitemap
  • Terms
  • Blockchain
  • CleanTech

Follow Us

No Result
View All Result
  • Home
  • Startups
  • Hubs
  • Funding
  • WomenTech
  • CleanTech
  • Blockchain

© 2013-2021 techbuild.africa. All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In