• Latest
  • Trending
Information theft is the goal of TikTok Challenge - NCC

Information theft is the goal of TikTok Challenge – NCC

December 8, 2022
Edtech startup The Invigilator raises $11 million to scale its AI platform

Edtech startup The Invigilator raises $11 million to scale its AI platform

September 6, 2025
iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

iXAfrica receives RMB financing to fast-track 20 MW expansion in Nairobi

September 6, 2025
OpenAI challenges LinkedIn with new AI-powered hiring platform

OpenAI challenges LinkedIn with new AI-powered hiring platform

September 6, 2025
Tanzanian fintech NALA takes its services to Kenya

Tanzanian fintech NALA takes its services to Kenya

September 6, 2025
Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

Call of Duty movie: Paramount, Activision strike deal for live-action adaptation

September 5, 2025
Meta Brings Back Facebook Poke with Emojis and Streaks

Meta Brings Back Facebook Poke with Emojis and Streaks

September 5, 2025
Know why they’re calling: Truecaller launches AI-powered insights

Know why they’re calling: Truecaller launches AI-powered insights

September 5, 2025
Visa harnesses local partnerships to launch Visa Pay in DR Congo

Visa harnesses local partnerships to launch Visa Pay in DR Congo

September 5, 2025
Betika denies recent reports of security breach

Betika denies recent reports of security breach

September 5, 2025
10 things you can actually buy with crypto in Africa

10 things you can actually buy with crypto in Africa

September 5, 2025
Your one-stop tech hub! Get the latest updates on AI, cybersecurity, fintech, and emerging technologies.
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Business

Information theft is the goal of TikTok Challenge – NCC

Modupeoluwa Olalere by Modupeoluwa Olalere
December 8, 2022
149 1
0
Information theft is the goal of TikTok Challenge - NCC
465
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

#invisiblechallenge on short-form video hosting site TikTok could expose devices to information-stealing malware, the Nigerian Communications Commission’s Computer Security Incident Response Team (NCC-CSIRT) advised.

The Invisible Challenge on TikTok involves encircling a subject who is supposed to be naked with a partially see-through body contouring filter.

According to an NCC-CSIRT caution, threat actors are using the popular TikTok challenge to distribute the information-stealing malware known as WASP Stealer.

Read also: The NCC CSIRT Discovers Malware That Targets Banking Applications

Why will this lead to Information theft?

As this TikTok challenge gains popularity, some attackers have started disseminating links to the software they say may counteract the filter’s effects but which really contains the WASP stealer.

RelatedPosts

NCC, CBN partner to address failed telecom transactions, enhance network service quality

NCC, ONSA Intervene in Diesel Supply Dispute, Avert Telecom Disruption

Show off your moves to win in the PUBG Mobile Afro Frenzy TikTok challenge

According to its developers, the WASP stealer is an undetected, persistent piece of malware that is housed on Discord and has a high probability of doing serious damage.

The NCC said that WASP stealer targets anyone who visits the link and downloads “unfilter.” After publishing them with a link, suspended accounts’ videos garnered over a million views. The URL connects to the defunct “Space Unfilter” Discord server, which had 32,000 users at its peak.

The short-form video app TikTok has already been connected to the risk of malware assaults. The fraudulent, phony TikTok URLs were the subject of a June 2020 notice from India’s Maharashtra Cyber, which deals with cybercrime. 

Brendan Carr, the FCC commissioner, requested that TikTok be removed from the Apple and Google app stores in July 2022 because the software’s extensive data collection created an unacceptable national security risk. 

The capabilities of this program must be understood despite the fact that there is a very significant danger of viruses in the online world.

How does TikTok malware operate? 

The company claims that this virus operates similarly to every other piece of malicious software. As soon as you click the link, a file or program is downloaded, and after it has been installed successfully, the virus has access to all the data on the devices where it is present.

Personally Identifiable Information (PII), including names and passwords, keystrokes from emails, chat programs, websites visited, and financial activity, may also be harvested by secretly monitoring user behaviour.

This malware may be capable of covertly collecting screenshots and video recordings or having the ability to activate any connected camera or microphone. This shows how impactful it can be for any individual.

Financial phishing, cyberattacks surge In Kenya and Nigeria

How to prevent TikTok malware fraud 

However, this may be avoided by taking a few inventive precautions when online or while viewing a movie. Some methods for stopping such an assault include 

  • Don’t click on any shady links. 
  • On your devices, install anti-malware software.
  • Any programs you don’t recall downloading should always be deleted from the app tray. 
  • Use strong password hygiene practices, such as using a password manager.

 

About the NCC-CSIRT 

The NCC founded the CSIRT as the telecom firm’s cyber security incident center to concentrate on situations that might have an effect on telecom consumers and the wider public. It works with ngCERT. 

The Nigerian Computer Emergency Response Team (ngCERT) was established by the Federal Government to reduce the frequency of upcoming computer risk situations by organizing, protecting, and securing Nigerian cyberspace to avoid attacks, challenges, or associated events.

Tags: Information theftNCCTikTok Challenge
Modupeoluwa Olalere

Modupeoluwa Olalere

Modupe is a tech content writer with 3+ years of experience turning complex ideas into clear, engaging stories. She covers innovation, digital trends, and emerging technologies. When she’s not writing, she’s exploring new tools or tracking trends shaping Africa’s tech ecosystem.

No Result
View All Result

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business

Follow Us:

  • facebook
  • instagram
  • Twitter(X)
  • Linkedin
  • YouTube
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Techpression.com -Techpression Media Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression.com -Techpression Media Limited

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.