Cyber Attacks On Africa Are Soaring

Africa is the lowest ranked continent on cyber security, Internet-based attacks, many experts and digital security practitioners say. 

According to some of these experts, the shortage, lack, or dilapidated conditions of high tech infrastructure, as well as the lack of well thought-out government policies for cybersecurity make Africa the most exposed continent to cyber threats and yet the least equipped to deal with the high and growing rate of cyber threats.

Last month the Ethiopian Information Network Security Agency (INSA) reported that a cyberattack directed at financial institutions in the country has happened but is now being blocked. The previous month in Addis Ababa, the capital of Ethiopia, it was reported that cyberattacks on Ethiopian government and large organisations have increased from 479 and 576 to 791 grand attacks annually during the past three successive years.

Ethiopian Cyber Emergency Readiness and Response Team (Ethio-CERT), a department within the agency in charge of protecting key infrastructures and financial institutions, says that the attack was foiled before it causes serious damage althouigh the report does not specify hich financial institutions were targeted in cyberattack. 

Ethiopia has shut down the Internet at least twice every year since 2015, whether during anti-government protests, state of emergency, or to limit exam cheating. For every day the Internet is blocked, NetBlocks estimates Ethiopia loses over $4.4 million. Prime minister Abiy Ahmed has promised to boost the tech scene.

When it comes to internet disruptions in Africa, Ethiopia isn’t an anomaly. At least 22 African states have partially or fully blocked the Internet or obstructed social media networks in the past five years due to a political uprising Algeria and Sudan, before, during or after elections in DR Congo and Benin and ahead of national examinations in Algeria and Somalia.

Across the African continent, internet stoppages are happening for longer, more sophisticated, and targeted, with dictators being the most frequent attackers.

The current Internet penetration rate is 15.4% in Ethiopia and the governmnet it is currently attempting a broad expansion of access throughout the country, however, three-quarters of the country's Internet cafés are in the capital city, Addis Ababa, and even there access is often slow and unreliable.

In South Africa, hackers attacked several key organisations in October, 2019, impacting everything from workers’ paychecks to 112 emergency calls. While Johannesburg is nicknamed 'the City of Gold' when thieves attacked the City and several South African banks recently, they weren’t looking for gold. They weren’t even looking for rand notes. These bank robbers were looking for the modern criminal’s currency of choice, Bitcoin. 

The world has lost $1.5 trillion in 2018 due to cyberattacks and is predicted to lose as much as $6 trillion by 2021.

SSLStore:         Borkena:          QZ.com:     Morroco Word News:       ENA

You Might Also Read: 

Hackers Demand Ransom After Stealing Johannesburg's Data:

Zambia Wants Tough New Online Regulations:

 

 

« Criminals Are Using AI For Attacks
The Invisible Areas Of The World Wide Web »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

InfoWatch

InfoWatch

InfoWatch solutions allow you to protect data and information assets that are critically important to your business.

Raz-Lee Security

Raz-Lee Security

Raz-Lee Security is the leading security solution provider for IBM Power i, otherwise known as iSeries or AS/400 servers.

Vicarius

Vicarius

Vicarius’ mission is to revolutionize vulnerability management from problem detection to proactive problem resolution.

ubirch

ubirch

The ubirch platform is designed to ensure that IoT data is trustworthy and secure.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Research Institute in Verified Trustworthy Software Systems (VeTSS)

Research Institute in Verified Trustworthy Software Systems (VeTSS)

The main purpose of VeTSS is to support program analysis, testing and verification, to achieve guarantees of software correctness, safety, and security.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Cyber Skyline

Cyber Skyline

Cyber Skyline is a revolutionary cloud platform to practice, develop, and measure your team's technical cybersecurity skills.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Unified Solutions

Unified Solutions

Unified Solutions provide a full continuum of cyber security services, compliance, and technology solutions.

SecureChain AI

SecureChain AI

SecureChain are combining blockchain and AI technology to create a smarter blockchain platform especially in terms of security.

IT-Schulungen.com / New Elements GmbH

IT-Schulungen.com / New Elements GmbH

Under the name IT-Schulungen.com, the Nuremberg-based New Elements GmbH has been operating one of the largest training centres in the German-speaking world for over 20 years.

INT3L

INT3L

The INT3L group (formerly Defentek) is a provider of national security and intelligence solutions, systems and services.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.