• News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
Friday, December 19, 2025
  • Login
No Result
View All Result
NEWSLETTER
Tech | Business | Economy
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
  • News
  • Tech
    • DisruptiveTECH
    • ConsumerTech
    • How To
    • TechTAINMENT
  • Business
    • Telecoms
    • Commerce & Mobility
    • Environment
    • Travel
    • StartUPs
      • Chidiverse
    • TE Insights
    • Security
  • Partners
  • Economy
    • Finance
    • Fintech
    • Digital Assets
    • Personal Finance
    • Insurance
  • Features
    • IndustryINFLUENCERS
    • Guest Writer
    • EventDIARY
    • Editorial
    • Appointment
  • TECHECONOMY TV
  • Apply
  • TBS
  • BusinesSENSE For SMEs
  • Chidiverse
No Result
View All Result
Tech | Business | Economy
No Result
View All Result
  • News
  • Finance
  • StartUPs
  • TechTAINMENT
  • Guest Writer
  • Digital Assets
  • IndustryINFLUENCERS
  • Environment
  • Macro Monday
ADVERTISEMENT

Home »  NCC-CSIRT Advices Telecom Subscribers to Activate 2-Factor Authentication over Somnia Ransomware, others

 NCC-CSIRT Advices Telecom Subscribers to Activate 2-Factor Authentication over Somnia Ransomware, others

Admin by Admin
November 23, 2022
in Security
Reading Time: 2 mins read
0
Somnia Ransomware, two-factor authentication

NCC-CSIRT advisory over Somnia Ransomware

RelatedPosts

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

UBA
Advertisements

In response to the discovery of a new attack that compromises victims’ VPN (Virtual Private Network) accounts to compromise messaging app, Telegram, the Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) has advised users to adopt two-factor authentication to protect their Telegram accounts and to not download unknown Advanced IP Scanner Software.

Ukrainian cyber experts discovered the attack, which uses Vidar Malware (Vidar Stealer) to steal Telegram session data, which in the absence of configured two-factor authentication and a passcode, allows unauthorized access to the victim’s telegram account and corporate account or network.

The malware, which exploits unauthorized access to users’ Telegram accounts and corporate accounts to steal data, targets platforms across iOS, Android, Linux, Mac and Windows Operating Systems.

“The Ukrainian CERT alleged that a Somnia Ransomware was created to be used on Telegram that tricks users to download an installer that mimics ‘Advanced IP Scanner’ software, which contains Vidar Malware. The installer infects the system with the Vidar stealer, which steals the victim’s Telegram session data to take control of their account.

MTN New

“The threat actors abuse the victim’s Telegram account in some unspecified manner to steal VPN connection data (authentication and certificates). If the VPN account is not protected by two-factor authentication passcode, the hackers use it to gain unauthorized access to the victim’s employer’s corporate network”, the alert and advisory states.

“Once inside, the intruders conduct reconnaissance work using tools like Netscan, Rclone, Anydesk, and Ngrok, to perform various surveillance and remote access activities, and then deploy a Cobalt Strike beacon, exfiltrating data using the Rclone program,” the report stated.

The CSIRT is the telecom sector’s cyber security incidence centre set up by the NCC to focus on incidents in the telecom sector and as they may affect telecom consumers and citizens at large.

The CSIRT also works collaboratively with ngCERT, established by the Federal Government to reduce the volume of future computer risk incidents by preparing, protecting, and securing Nigerian cyberspace to forestall attacks, and problems or related events.

0Shares

stanbic
Admin

Admin

TechEconomy is a Distinct News Media That Focuses on BUSINESSES, PEOPLE, PLATFORMS, INSTITUTIONS

Related Posts

AI-generated websites

REPORT: Hackers Using AI‑Generated Websites as Attack Tools

by Peter Oluka
December 17, 2025
0
0

Kaspersky has detected a malicious campaign, where attackers leverage AI-generated websites to distribute versions of the legitimate remote access tool...

Cybercriminals Using Popular Turkish, Arabic Books as Bait to Steal Personal Data

REPORT: Cybercriminals Using Popular Turkish, Arabic eBooks as Bait to Steal Personal Data

by Peter Oluka
December 17, 2025
0
0

The Kaspersky Global Research & Analysis Team has uncovered a malware-as-a-service campaign targeting ebook readers across Turkey, Egypt, Bangladesh and...

Nigeria Hit by 4,200 Weekly Cyberattacks as Africa’s Threats Surge

Nigeria Records 4,200 Weekly Cyberattacks Per Organisation as Africa Faces One of the World’s Highest Threat Levels

by Joan Aimuengheuwa
December 16, 2025
0
0

The data places Nigeria at the centre of a continental problem.

Sophos MITRE ATT&CK Evaluations

Sophos XDR Delivers 100% Detection Coverage in the Latest MITRE ATT&CK Evaluation

by Destiny Eseaga
December 13, 2025
0
0

Sophos, a global leader of innovative security solutions for defeating cyberattacks, has announced its best-ever results in the MITRE ATT&CK...

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

Businesses Turn to Cyber Insurance as AI-Driven Attacks Surge in 2025

by Joan Aimuengheuwa
December 10, 2025
0
0

The global cyber insurance market has reached $20.56 billion in 2025.

Technological Trends Reshaping International Production | State of Ransomware in Manufacturing and Production 2025

Sophos: Manufacturing Sector Sees Drop in Ransomware, But Spike in Data Theft

by Joan Aimuengheuwa
December 5, 2025
0
0

Quick Read: Manufacturing experienced a 40% encryption rate, reflecting stronger early detection Attackers escalated data theft and extortion to maintain...

Load More
Next Post
Beeta playwright competition winner

Yemi Akande Emerges Winner of 5th Beeta Playwright Competition

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

This site uses Akismet to reduce spam. Learn how your comment data is processed.

MTN New
UBA
Advertisements
  • About Us
  • Advertise
  • Careers
  • Contact Us

© 2025 TECHECONOMY.

No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
    • Home – Layout 4
    • Home – Layout 5
  • World
  • Politics
  • Business
  • Science
  • Tech
  • Entertainment
  • Lifestyle

© 2025 TECHECONOMY.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.