Hackers Demand Ransom After Stealing Johannesburg's Data

Johannesburg is a world class city on a booming continent and a pan-african financial powerhouse.  It is also a repeat victim of hackers who at least twice in three months have shut down important city services and networks. 

In a targeted ransomware attack, hackers first took down the city's computer network on October 24th, stealing data from the city and threatening to release it unless the ransom payment is made. The city's IT team was still trying to restore critical systems days after the event, since its call center, website and e-services platform were all taken down in the attack. 

The group behind the attack, going by the name of Shadow Kill Hackers, is demanding a payment of four Bitcoin ($39,457) to prevent the release the data it has stolen. The group claims the data includes passwords and other sensitive data, such as finance and personal population information. Attempts were made to track down the hackers through details they gave on how to pay the bitcoins.

According to the ransom note, if the payment is made the data will be destroyed and the group will provide details to Johannesburg’s information technology staff on how it managed to steal the data, plus related security issues on the city’s network. 

The attack on South Africa’s main financial center, accounting for 16% of the country’s gross domestic product, has also delivered a noticeable blow to the country’s economy. 

This isn’t the first attack targeting Johannesburg. City Power, the city-owned electricity provider, was crippled by ransomware in July 2019. Two apparently separate groups of hackers are threatening to close down the finance sector and local government at a time when South Africans would be paying municipal bills and gaining access their bank accounts.

The banking industry was hit recently by a wave of DDOS attacks and this the attackers claimed in their ransoms was a small sample of what was to come. 

“This small attack was big and guys are busy installing systems to mitigate the coming attack,” said local cybersecurity expert Jacques van Heerden, who has knowledge of the cyberattack. 

 

Independent IOL:          Silicon Angle:            Technology Review

You Might Also Read: 

South African Cybercrime Is Advancing Fast:

US City Of Atlanta Suffers An Attack:

 

« 2020 Will Be A Landmark Year For AI
Easy Cyber Knowledge Ch.5 : Robotics AI And BioTech »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

4ARMED

4ARMED

4ARMED specializes in penetration testing, information security consultancy and security training

Senetas

Senetas

Senetas is a leading developer and manufacturer of certified high-assurance encryption solutions, dedicated to protecting network transmitted data without compromising performance.

Information Security Research Group - University of South Wales

Information Security Research Group - University of South Wales

The Information Security Research Group has an international reputation in the areas of network security, computer forensics and threat analysis.

CFC Underwriting

CFC Underwriting

CFC is a specialist insurance provider and a pioneer in emerging risk, including cyber insurance.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Pole SCS (Secure Communicating Solutions)

Pole SCS (Secure Communicating Solutions)

SCS is a world-class competitiveness cluster dedicated to digital technologies in the fields of Microelectronics, Internet Of Things, Digital Security, Artificial Intelligence And Big Data.

AFCON Control & Automation

AFCON Control & Automation

AFCON is a leading global provider of software solutions and services for the smart management of Control & Automation systems in the age of Digital Transformation.

D3 Security

D3 Security

D3's Smart SOAR platform is at the forefront of the security automation revolution, helping clients around the world to rapidly identify, analyze, and resolve advanced threats.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

VC3

VC3

VC3 provides a full range of Information Technology Solutions and Services to hundreds of municipalities and organizations throughout the USA.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Klarytee

Klarytee

Protect your data wherever it goes. Klarytee is a SaaS platform that builds security into sensitive content to enable granular control in AI, public cloud and SaaS.