Cyberattacks: NITDA cautions against hacking group masquerading as USAID
Science & Tech
THE National Information Technology Development Agency (NITDA) has urged Nigerians to beware of a widespread malicious email campaign undertaken by a hacking group, Nobelium.
NITDA warned that the group is masquerading as the US Agency for International Development (USAID).
Mrs. Hadiza Umar, NITDA Cooperate Affairs and External Relations’ Head gave the warning in a statement she issued late on Sunday in Abuja.
Umar said the malicious group, uncovered by Microsoft company, had been discovered to leverage the legitimate mass-mailing service, to masquerade as USAID and distribute malicious Uniform Resource Locator (URLs) to a wide variety of organizations.
According to her, the group targets government organizations, Non-Government Organisations, think tanks, the military, IT service providers, health, technology, and telecommunications providers.
“Their antics involve the use of emails claiming to be an alert from USAID about new documents published by former President Donald Trump about election fraud.
“Once users click the link in the email, the URL would direct them to the legitimate Constant Contact Service and then redirect to Nobelium-controlled infrastructure through a URL that delivers a malicious International Organisation for Standardisation (ISO) file.
“This, in turn, enables the criminals to execute further malicious objectives, such as lateral movement, data exfiltration and delivery of additional malware,” she said.
The official further advised NigeTHE National Information Technology Development Agency (NITDA) has urged Nigerians to beware of widespread malicious email rain to be wary of such criminals masquerading as USAID and turn on cloud-delivered protection in Microsoft Defender Antivirus or the equivalent to cover rapidly evolving attacker tools and techniques for mitigation.
She further said people should run Endpoint Detection and Response (EDR) in block mode to enable antivirus to block malicious artifacts because the EDR in block mode works behind the scenes to remediate malicious artifacts that were detected post-breach.
“Enable network protection to prevent applications or users from accessing malicious domains and other malicious content on the Internet.
“Enable investigation and remediation in full automated mode to allow antivirus take immediate action on alerts to resolve breaches.
“Use device discovery to increase your visibility into your network by finding unmanaged devices on your network and onboarding them
“Enable Multi-Factor Authentication (MFA) to mitigate compromised credentials and block all office applications from creating child processes,” she advised.
Umar said the mitigations should be applied by users and administrators.
She also said Nigerians could report an incident by contacting NITDA’S Computer Emergency Readiness and Response Team via email support@cerrt.ng or telephone +2348178774580. (NAN)
– May 31, 2021 @ 09:06 GMT /
Related Posts
Biotechnology society bestows champion award on AATF’s Oikeh
THE Biotechnology Society of Nigeria has awarded Dr Sylvester Oikeh of African Agricultural Technology Foundation (AATF) with its prestigious Champion Award for...
Read MoreUK, Nigeria stakeholders partner on cybersecurity
THE UK is uniquely placed to partner with Nigeria to raise awareness and tackle emerging threats and cybersecurity challenges affecting...
Read MoreFG inaugurates online service-wide circular portal
THE Federal Government on Wednesday inaugurated an online Compendium of Circulars – a service-wide portal designed to make circulars easily...
Read MoreMost Read
Subscribe to Our Newsletter
Keep abreast of news and other developments from our website.