Hackers Demand Ransom After Stealing Johannesburg's Data

Johannesburg is a world class city on a booming continent and a pan-african financial powerhouse.  It is also a repeat victim of hackers who at least twice in three months have shut down important city services and networks. 

In a targeted ransomware attack, hackers first took down the city's computer network on October 24th, stealing data from the city and threatening to release it unless the ransom payment is made. The city's IT team was still trying to restore critical systems days after the event, since its call center, website and e-services platform were all taken down in the attack. 

The group behind the attack, going by the name of Shadow Kill Hackers, is demanding a payment of four Bitcoin ($39,457) to prevent the release the data it has stolen. The group claims the data includes passwords and other sensitive data, such as finance and personal population information. Attempts were made to track down the hackers through details they gave on how to pay the bitcoins.

According to the ransom note, if the payment is made the data will be destroyed and the group will provide details to Johannesburg’s information technology staff on how it managed to steal the data, plus related security issues on the city’s network. 

The attack on South Africa’s main financial center, accounting for 16% of the country’s gross domestic product, has also delivered a noticeable blow to the country’s economy. 

This isn’t the first attack targeting Johannesburg. City Power, the city-owned electricity provider, was crippled by ransomware in July 2019. Two apparently separate groups of hackers are threatening to close down the finance sector and local government at a time when South Africans would be paying municipal bills and gaining access their bank accounts.

The banking industry was hit recently by a wave of DDOS attacks and this the attackers claimed in their ransoms was a small sample of what was to come. 

“This small attack was big and guys are busy installing systems to mitigate the coming attack,” said local cybersecurity expert Jacques van Heerden, who has knowledge of the cyberattack. 

 

Independent IOL:          Silicon Angle:            Technology Review

You Might Also Read: 

South African Cybercrime Is Advancing Fast:

US City Of Atlanta Suffers An Attack:

 

« 2020 Will Be A Landmark Year For AI
Easy Cyber Knowledge Ch.5 : Robotics AI And BioTech »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Dubex

Dubex

Dubex is Denmark's leading business-oriented IT security specialist.

Critifence

Critifence

Critifence provides unique Cyber Security solutions designed for Critical Infrastructure, SCADA and Industrial Control Systems.

Uppsala Security

Uppsala Security

Uppsala Security built the first crowdsourced Threat Intelligence platform known as the Sentinel Protocol, which is powered by blockchain technology.

Protergo Cyber Security

Protergo Cyber Security

Protergo Cyber Security is the first integrated provider of cybersecurity solutions in Indonesia. We proactively protect our clients from cyber threats.

Alsid

Alsid

Alsid helps corporates to anticipate attacks by detecting breaches before hackers can exploit them.

ENLIGHTENi

ENLIGHTENi

ENLIGHTENi are the platform to develop next-gen talent in Technology, Risk, and Cybersecurity. Our mission is to develop next-gen talent through challenge-based learning and team collaboration.

SOFTwarfare

SOFTwarfare

SOFTwarfare deliver high-quality, reliable and secure enterprise application integrations through RESTful APIs for Cyber, Ops & Dev.

Cyway

Cyway

Cyway is a value-added cybersecurity distributor focusing on on-prem, cloud solutions and hybrid solutions, IoT, AI & machine learning IT security technologies.

OriginalMy

OriginalMy

OriginalMy is a cybersecurity startup, focussed on digital governance and information authentication. Its mission is to prove authenticity using state-of-the-art cryptography and blockchain technology

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

Condition Zebra

Condition Zebra

Condition Zebra has wide experience in providing IT Security Services, Training, and Certification in the field of cybersecurity.

63Sats Cybertech

63Sats Cybertech

63SATS is the cybersecurity business unit of 63 Moons Technologies, a world leader in providing next-generation technology ventures, innovations, platforms, and solutions. 

Metrodata Group

Metrodata Group

PT. Metrodata Electronics, known as Metrodata Group, is the leading information communication technology company in Indonesia.

MODUS X

MODUS X

MODUS X is a Ukrainian IT product and service company created from the IT department of the DTEK Group of Companies.

Freeze

Freeze

Freeze prevents attacks before they can start by finding, removing, and stopping the spread of information about your organization and employees.