Cyber Attacks On Africa Are Soaring

Africa is the lowest ranked continent on cyber security, Internet-based attacks, many experts and digital security practitioners say. 

According to some of these experts, the shortage, lack, or dilapidated conditions of high tech infrastructure, as well as the lack of well thought-out government policies for cybersecurity make Africa the most exposed continent to cyber threats and yet the least equipped to deal with the high and growing rate of cyber threats.

Last month the Ethiopian Information Network Security Agency (INSA) reported that a cyberattack directed at financial institutions in the country has happened but is now being blocked. The previous month in Addis Ababa, the capital of Ethiopia, it was reported that cyberattacks on Ethiopian government and large organisations have increased from 479 and 576 to 791 grand attacks annually during the past three successive years.

Ethiopian Cyber Emergency Readiness and Response Team (Ethio-CERT), a department within the agency in charge of protecting key infrastructures and financial institutions, says that the attack was foiled before it causes serious damage althouigh the report does not specify hich financial institutions were targeted in cyberattack. 

Ethiopia has shut down the Internet at least twice every year since 2015, whether during anti-government protests, state of emergency, or to limit exam cheating. For every day the Internet is blocked, NetBlocks estimates Ethiopia loses over $4.4 million. Prime minister Abiy Ahmed has promised to boost the tech scene.

When it comes to internet disruptions in Africa, Ethiopia isn’t an anomaly. At least 22 African states have partially or fully blocked the Internet or obstructed social media networks in the past five years due to a political uprising Algeria and Sudan, before, during or after elections in DR Congo and Benin and ahead of national examinations in Algeria and Somalia.

Across the African continent, internet stoppages are happening for longer, more sophisticated, and targeted, with dictators being the most frequent attackers.

The current Internet penetration rate is 15.4% in Ethiopia and the governmnet it is currently attempting a broad expansion of access throughout the country, however, three-quarters of the country's Internet cafés are in the capital city, Addis Ababa, and even there access is often slow and unreliable.

In South Africa, hackers attacked several key organisations in October, 2019, impacting everything from workers’ paychecks to 112 emergency calls. While Johannesburg is nicknamed 'the City of Gold' when thieves attacked the City and several South African banks recently, they weren’t looking for gold. They weren’t even looking for rand notes. These bank robbers were looking for the modern criminal’s currency of choice, Bitcoin. 

The world has lost $1.5 trillion in 2018 due to cyberattacks and is predicted to lose as much as $6 trillion by 2021.

SSLStore:         Borkena:          QZ.com:     Morroco Word News:       ENA

You Might Also Read: 

Hackers Demand Ransom After Stealing Johannesburg's Data:

Zambia Wants Tough New Online Regulations:

 

 

« Criminals Are Using AI For Attacks
The Invisible Areas Of The World Wide Web »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

L3Harris United Kingdom

L3Harris United Kingdom

L3Harris UK (formerly L3 TRL Technology) designs and delivers advanced electronic warfare and cyber security solutions for the protection of people, infrastructure and assets.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

Mobile Mentor

Mobile Mentor

Mobile Mentor is an independent provider of enterprise mobility solutions in New Zealand and Australia.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Intrasoft International

Intrasoft International

Intrasoft International is a leading European IT Solutions and Services Group offering a full range of IT services including Information Security.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute (SSPI)

Slovak Security Policy Institute is an independent non-governmental organization that focuses on research and analysis of security challenges including defence and cyber security.

Uleska

Uleska

Uleska is a scalable platform that provides automated and continuous software security testing whilst translating cyber risk.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

Tetrad Digital Integrity (TDI)

Tetrad Digital Integrity (TDI)

TDI is a world-class consulting firm offering cybersecurity services to government agencies and commercial clients around the world.

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Stratus Technologies

Stratus Technologies

Edge Computing solves the inherent challenges of bandwidth, latency, and security at edge locations to enable IIoT devices and data acquisition.

ThreatFabric

ThreatFabric

ThreatFabric integrates industry-leading threat intel, behavioral analytics, advanced device fingerprinting and over 10.000 adaptive fraud indicators.

ANY.RUN

ANY.RUN

ANY.RUN is an interactive online malware analysis service created for dynamic as well as static research of multiple types of cyber threats.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

Point Wild

Point Wild

Point Wild is a holding company that acquires, integrates and manages a diverse portfolio of best-in-class cybersecurity brands for consumers and enterprises.