www.darkreading.com
Open in
urlscan Pro
104.16.225.171
Public Scan
URL:
https://www.darkreading.com/cloud-security/ddos-attacks-surge-africa-digital-footprint
Submission: On December 27 via api from TR — Scanned from IS
Submission: On December 27 via api from TR — Scanned from IS
Form analysis
0 forms found in the DOMText Content
TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa TECHTARGET AND INFORMA TECH’S DIGITAL BUSINESS COMBINE. Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities. Black Hat NewsOmdia CybersecurityAdvertise Newsletter Sign-Up Newsletter Sign-Up Cybersecurity Topics RELATED TOPICS * Application Security * Cybersecurity Careers * Cloud Security * Cyber Risk * Cyberattacks & Data Breaches * Cybersecurity Analytics * Cybersecurity Operations * Data Privacy * Endpoint Security * ICS/OT Security * Identity & Access Mgmt Security * Insider Threats * IoT * Mobile Security * Perimeter * Physical Security * Remote Workforce * Threat Intelligence * Vulnerabilities & Threats World RELATED TOPICS * DR Global * Middle East & Africa * Asia Pacific See All The Edge DR Technology Events RELATED TOPICS * Upcoming Events * Podcasts * Webinars SEE ALL Resources RELATED TOPICS * Library * Newsletters * Podcasts * Reports * Videos * Webinars * Whitepapers * * * * * Partner Perspectives SEE ALL * Сloud Security * Threat Intelligence * Cyberattacks & Data Breaches * Cyber Risk Breaking cybersecurity news, news analysis, commentary, and other content from around the world, with an initial focus on the Middle East & Africa and the Asia Pacific DDOS ATTACKS SURGE AS AFRICA EXPANDS ITS DIGITAL FOOTPRINTDDOS ATTACKS SURGE AS AFRICA EXPANDS ITS DIGITAL FOOTPRINT As organizations on the continent expand their use of digital technologies, they increasingly face many of the same threats that entities in other regions have had to deal with for years. Jai Vijayan, Contributing Writer December 26, 2024 4 Min Read Source: Golden Dayz via Shutterstock Rising Internet adoption and digital transformation initiatives are exposing organizations in Africa to a growing range of cyber threats. One manifestation of the trend is a steady increase in distributed denial-of-service (DDoS) attacks on organizations in a handful of North African countries — which also happen to be the ones with the highest Internet penetration rates in the region. SURGE IN DDOS ACTIVITY A recent analysis of threat activity data during the first half of 2024 by Netscout showed a 30% increase in DDoS attacks in the Middle East and Africa overall compared with the previous quarter. Countries that experienced the largest growth in DDoS attacks included Algeria, Morocco, Tunisia, and Egypt. Morocco, which has a 90% Internet penetration rate, reported 61,000 DDoS attacks during the first half of 2024, which was the highest number of DDoS attacks in the region during the period. A plurality of the attacks — 16,461 — targeted wireless telecom producers in the region; more than 6,000 were directed at wired telecom companies; and the rest affected organizations across multiple industry sectors. Organizations in Egypt, another country in the region with a high Internet penetration rate, collectively experienced some 45,108 DDoS attacks in the first half of the year, with wired telecom carriers being the most frequently targeted entities, followed by wireless carriers and educational institutions. Netscout found some of the highest bandwidth attacks during the time period in Egypt, with the biggest one clocking in at a hefty 332.96 Gbit/s. Related:China's 'Evasive Panda' APT Debuts High-End Cloud Hijacking The story with Tunisia, which experienced 4,511 DDoS attacks in the first six months, was similar in terms of victimology: most victims were wired or wireless telecom providers. However, Netscout found threat actors deploying a larger number of DDoS attacks against Tunisian organizations than organizations in other countries. The largest such attack type involved a startling 27 vectors, including Apple Remote Management Service, Connection-less Lightweight Directory Access Protocol (CLDAP) , Constrained Application Protocol (COAP), and Domain Name System (DNS) amplification techniques for significantly increasing the power of an attack. GEOPOLITICAL TENSIONS, "ONLINE-NESS" DRIVE CYBER ACTIVITY "These attacks can be attributed in part to businesses in countries such as Morocco, Tunisia, Egypt, Libya, and Algeria increasing their online presence over the past year," says Richard Hummel, director of threat intelligence at Netscout. "While digital transformation is generally a cause for celebration, unfortunately, it also means that more devices and services can be disrupted by attacks." Related:'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks A larger attack surface, however, is not the only reason for the increased DDoS activity in Africa and the Middle East, Hummel says. "Geopolitical tensions in these regions are also fueling a surge in hacktivist activity as real-world political disputes spill over into the digital world," he says. "Unfortunately, hacktivists often target critical infrastructure like government services, utilities, and banks to cause maximum disruption." And DDoS attacks are by no means the only manifestation of the new threats that organizations in Africa are having to contend with as they broaden their digital footprint. GROWING CYBER-ESPIONAGE, CYBERCRIME RISKS The Africa Center for Strategic Studies in a recent report assessed that the increasing spread of IT, communications, and related technologies in the region is rapidly amplifying and altering threats against organizations — and raising national security challenges in the process. The center, which is a US Department of Defense institution, expects that over the next few years organizations in Africa will have to contend with a many of the same cyber threats that entities in other regions of the world have had to contend with for years. Related:IDF Has Rebuffed 3B Cyberattacks Since Oct. 7, Colonel Claims One of them is cyber espionage. "Cyberspace has fundamentally changed the methods and means through which states gather information on one another and their citizens," the Africa Center report noted. "Though the most significant cyberespionage concerns in Africa have centered around China, espionage and surveillance capabilities are rapidly diffusing across the continent." Attacks on critical infrastructure and financially motived attacks by organized crime are other looming concerns. In the center's assessment, Africa's government networks and networks belonging to the military, banking, and telecom sectors are all vulnerable to disruptive cyberattacks. Exacerbating the concern is the relatively high potential for cyber incidents resulting from negligence and accidents. Organized crime gangs — the scourge of organizations in the US, Europe, and other parts of the world, present an emerging threat to organizations in Africa, the Center has assessed. "Growing internet penetration rates in Africa has both led to new kinds of cyber-dependent criminal activities, such as business email compromise or romance scams, as well transformed the financing and market dynamics of more traditional organized crime networks." Supply chain attacks are another major and emerging concern, especially given the high reliance on foreign suppliers among organizations in Africa. Agnidipta Sarkar, vice president and CISO advisory at ColorToken, says organizations in Africa are going to come under growing pressure to implement defenses against new cyber threats, even as they embark on their digital transformation journey. "The ability to continue business operations, despite cyberattacks, will encourage investments in the region," he predicts. "Effectively reporting breaches will emerge as a highly sought-after capability for CISOs, especially [for] those who can." Read more about: DR Global Middle East & Africa ABOUT THE AUTHOR Jai Vijayan, Contributing Writer Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year career at Computerworld, Jai also covered a variety of other technology topics, including big data, Hadoop, Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai covered technology issues for The Economic Times in Bangalore, India. Jai has a Master's degree in Statistics and lives in Naperville, Ill. See more from Jai Vijayan, Contributing Writer Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. Subscribe You May Also Like -------------------------------------------------------------------------------- More Insights Webinars * Securing Your Cloud Data Across the Attack Timeline Jan 15, 2025 * The Artificial Future Trend Micro Security Predictions for 2025 Jan 16, 2025 More Webinars EDITOR'S CHOICE Apache's logo on a mobile phone screen Application Security Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2Orgs Scramble to Fix Actively Exploited Bug in Struts 2 byNate Nelson, Contributing Writer Dec 19, 2024 5 Min Read Cute bug on a leaf Vulnerabilities & Threats Fortinet Addresses Unpatched Critical RCE VectorFortinet Addresses Unpatched Critical RCE Vector byTara Seals, Managing Editor, News, Dark Reading Dec 19, 2024 2 Min Read Pipes in an industrial setting Vulnerabilities & Threats OT/ICS Engineering Workstations Face Barrage of Fresh MalwareOT/ICS Engineering Workstations Face Fresh Malware Barrage byBecky Bracken, Senior Editor, Dark Reading Dec 19, 2024 1 Min Read Reports * Managing Third-Party Risk Through Situational Awareness Jul 31, 2024 * 2024 InformationWeek US IT Salary Report May 29, 2024 More Reports Webinars * Securing Your Cloud Data Across the Attack Timeline Jan 15, 2025 * The Artificial Future Trend Micro Security Predictions for 2025 Jan 16, 2025 More Webinars White Papers * From security alert to action: Accelerating incident response with automated investigations * Solution Brief: Introducing the runZero Platform * Top 10 CI/CD Security Risks: The Technical Guide * Generative AI Gifts * How to Use Threat Intelligence to Mitigate Third-Party Risk More Whitepapers DISCOVER MORE Black HatOmdia WORKING WITH US About UsAdvertiseReprints JOIN US Newsletter Sign-Up FOLLOW US Copyright © 2024. This website is owned and operated by Informa TechTarget, part of a global network that informs, influences and connects the world’s technology buyers and sellers. All copyright resides with them. Informa PLC’s registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466. Home|Cookie Policy|Privacy|Terms of Use