Description

McAfee Labs has detected a novel variant of the Android malware MoqHao that automatically activates upon device installation, requiring no user interaction. Unlike previous iterations, this variant initiates malicious activities immediately upon installation, posing a significant threat to users in France, Germany, India, Japan, and South Korea. Associated with the financially motivated Chinese cluster known as Roaming Mantis (aka Shaoye), MoqHao typically spreads through SMS messages containing fraudulent links, often disguised as package delivery notifications. Upon clicking these links, Android users unwittingly install the malware, which now operates seamlessly without user engagement. The campaign has evolved to obfuscate these links further using URL shorteners, increasing its success rate. This iteration of MoqHao is equipped with advanced capabilities, including the ability to silently harvest sensitive information such as device metadata, contacts, SMS messages, and photos. It can also make silent calls to specific numbers and manipulate Wi-Fi settings. McAfee Labs has notified Google of these findings, prompting efforts to implement mitigations in future Android versions. Meanwhile, Chinese cybersecurity firm QiAnXin has uncovered a separate threat from the Bigpanzi cybercrime syndicate, which targets Android-based smart TVs and set-top boxes for botnet recruitment, posing risks of DDoS attacks and illicit content dissemination. To protect against MoqHao and similar threats, users are advised to exercise caution when clicking links from unknown sources, avoid downloading apps from untrusted websites, and keep their devices updated with the latest security patches. Additionally, users should remain vigilant against suspicious activity and report any unusual behavior to cybersecurity authorities.