www.darkreading.com Open in urlscan Pro
104.16.224.171  Public Scan

URL: https://www.darkreading.com/cloud-security/ddos-attacks-surge-africa-digital-footprint
Submission: On December 27 via api from TR — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

TechTarget and Informa Tech’s Digital Business Combine.TechTarget and Informa


TECHTARGET AND INFORMA TECH’S DIGITAL BUSINESS COMBINE.

Together, we power an unparalleled network of 220+ online properties covering
10,000+ granular topics, serving an audience of 50+ million professionals with
original, objective content from trusted sources. We help you gain critical
insights and make more informed decisions across your business priorities.

Black Hat NewsOmdia CybersecurityAdvertise

Newsletter Sign-Up

Newsletter Sign-Up

Cybersecurity Topics

RELATED TOPICS

 * Application Security
 * Cybersecurity Careers
 * Cloud Security
 * Cyber Risk
 * Cyberattacks & Data Breaches
 * Cybersecurity Analytics
 * Cybersecurity Operations
 * Data Privacy
 * Endpoint Security
 * ICS/OT Security

 * Identity & Access Mgmt Security
 * Insider Threats
 * IoT
 * Mobile Security
 * Perimeter
 * Physical Security
 * Remote Workforce
 * Threat Intelligence
 * Vulnerabilities & Threats


World

RELATED TOPICS

 * DR Global
 * Middle East & Africa

 * Asia Pacific

See All
The Edge
DR Technology
Events

RELATED TOPICS

 * Upcoming Events
 * Podcasts

 * Webinars

SEE ALL
Resources

RELATED TOPICS

 * Library
 * Newsletters
 * Podcasts
 * Reports
 * Videos
 * Webinars

 * Whitepapers
 * 
 * 
 * 
 * 
 * Partner Perspectives

SEE ALL


 * Сloud Security
 * Threat Intelligence
 * Cyberattacks & Data Breaches
 * Cyber Risk

Breaking cybersecurity news, news analysis, commentary, and other content from
around the world, with an initial focus on the Middle East & Africa and the Asia
Pacific




DDOS ATTACKS SURGE AS AFRICA EXPANDS ITS DIGITAL FOOTPRINTDDOS ATTACKS SURGE AS
AFRICA EXPANDS ITS DIGITAL FOOTPRINT

As organizations on the continent expand their use of digital technologies, they
increasingly face many of the same threats that entities in other regions have
had to deal with for years.

Jai Vijayan, Contributing Writer

December 25, 2024

4 Min Read
Source: Golden Dayz via Shutterstock


Rising Internet adoption and digital transformation initiatives are exposing
organizations in Africa to a growing range of cyber threats.

One manifestation of the trend is a steady increase in distributed
denial-of-service (DDoS) attacks on organizations in a handful of North African
countries — which also happen to be the ones with the highest Internet
penetration rates in the region.


SURGE IN DDOS ACTIVITY

A recent analysis of threat activity data during the first half of 2024 by
Netscout showed a 30% increase in DDoS attacks in the Middle East and Africa
overall compared with the previous quarter. Countries that experienced the
largest growth in DDoS attacks included Algeria, Morocco, Tunisia, and Egypt.



Morocco, which has a 90% Internet penetration rate, reported 61,000 DDoS attacks
during the first half of 2024, which was the highest number of DDoS attacks in
the region during the period. A plurality of the attacks — 16,461 — targeted
wireless telecom producers in the region; more than 6,000 were directed at wired
telecom companies; and the rest affected organizations across multiple industry
sectors.



Organizations in Egypt, another country in the region with a high Internet
penetration rate, collectively experienced some 45,108 DDoS attacks in the first
half of the year, with wired telecom carriers being the most frequently targeted
entities, followed by wireless carriers and educational institutions. Netscout
found some of the highest bandwidth attacks during the time period in Egypt,
with the biggest one clocking in at a hefty 332.96 Gbit/s.



Related:China's 'Evasive Panda' APT Debuts High-End Cloud Hijacking

The story with Tunisia, which experienced 4,511 DDoS attacks in the first six
months, was similar in terms of victimology: most victims were wired or wireless
telecom providers. However, Netscout found threat actors deploying a larger
number of DDoS attacks against Tunisian organizations than organizations in
other countries. The largest such attack type involved a startling 27 vectors,
including Apple Remote Management Service, Connection-less Lightweight Directory
Access Protocol (CLDAP) , Constrained Application Protocol (COAP), and Domain
Name System (DNS) amplification techniques for significantly increasing the
power of an attack.




GEOPOLITICAL TENSIONS, "ONLINE-NESS" DRIVE CYBER ACTIVITY

"These attacks can be attributed in part to businesses in countries such as
Morocco, Tunisia, Egypt, Libya, and Algeria increasing their online presence
over the past year," says Richard Hummel, director of threat intelligence at
Netscout. "While digital transformation is generally a cause for celebration,
unfortunately, it also means that more devices and services can be disrupted by
attacks."

Related:'SloppyLemming' APT Abuses Cloudflare Service in Pakistan Attacks

A larger attack surface, however, is not the only reason for the increased DDoS
activity in Africa and the Middle East, Hummel says. "Geopolitical tensions in
these regions are also fueling a surge in hacktivist activity as real-world
political disputes spill over into the digital world," he says. "Unfortunately,
hacktivists often target critical infrastructure like government services,
utilities, and banks to cause maximum disruption."

And DDoS attacks are by no means the only manifestation of the new threats that
organizations in Africa are having to contend with as they broaden their digital
footprint.


GROWING CYBER-ESPIONAGE, CYBERCRIME RISKS

The Africa Center for Strategic Studies in a recent report assessed that the
increasing spread of IT, communications, and related technologies in the region
is rapidly amplifying and altering threats against organizations — and raising
national security challenges in the process. The center, which is a US
Department of Defense institution, expects that over the next few years
organizations in Africa will have to contend with a many of the same cyber
threats that entities in other regions of the world have had to contend with for
years.



Related:IDF Has Rebuffed 3B Cyberattacks Since Oct. 7, Colonel Claims

One of them is cyber espionage. "Cyberspace has fundamentally changed the
methods and means through which states gather information on one another and
their citizens," the Africa Center report noted. "Though the most significant
cyberespionage concerns in Africa have centered around China, espionage and
surveillance capabilities are rapidly diffusing across the continent."

Attacks on critical infrastructure and financially motived attacks by organized
crime are other looming concerns. In the center's assessment, Africa's
government networks and networks belonging to the military, banking, and telecom
sectors are all vulnerable to disruptive cyberattacks. Exacerbating the concern
is the relatively high potential for cyber incidents resulting from negligence
and accidents.

Organized crime gangs — the scourge of organizations in the US, Europe, and
other parts of the world, present an emerging threat to organizations in Africa,
the Center has assessed.  "Growing internet penetration rates in Africa has both
led to new kinds of cyber-dependent criminal activities, such as business email
compromise or romance scams, as well transformed the financing and market
dynamics of more traditional organized crime networks." Supply chain attacks are
another major and emerging concern, especially given the high reliance on
foreign suppliers among organizations in Africa.

Agnidipta Sarkar, vice president and CISO advisory at ColorToken, says
organizations in Africa are going to come under growing pressure to implement
defenses against new cyber threats, even as they embark on their digital
transformation journey.

"The ability to continue business operations, despite cyberattacks, will
encourage investments in the region," he predicts. "Effectively reporting
breaches will emerge as a highly sought-after capability for CISOs, especially
[for] those who can."





Read more about:

DR Global Middle East & Africa



ABOUT THE AUTHOR

Jai Vijayan, Contributing Writer



Jai Vijayan is a seasoned technology reporter with over 20 years of experience
in IT trade journalism. He was most recently a Senior Editor at Computerworld,
where he covered information security and data privacy issues for the
publication. Over the course of his 20-year career at Computerworld, Jai also
covered a variety of other technology topics, including big data, Hadoop,
Internet of Things, e-voting, and data analytics. Prior to Computerworld, Jai
covered technology issues for The Economic Times in Bangalore, India. Jai has a
Master's degree in Statistics and lives in Naperville, Ill.

See more from Jai Vijayan, Contributing Writer
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities,
data breach information, and emerging trends. Delivered daily or weekly right to
your email inbox.

Subscribe

You May Also Like

--------------------------------------------------------------------------------

Сloud Security

Patch Now: ServiceNow Critical RCE Bugs Under Active Exploit
Сloud Security

Microsoft Melds Identity & SSE With Entra Suite
Сloud Security

Multifactor Authentication Is Not Enough to Protect Cloud Data
Сloud Security

Microsoft Graph API Emerges as a Top Attacker Tool to Plot Data Theft
More Insights
Webinars

 * Securing Your Cloud Data Across the Attack Timeline
   
   Jan 15, 2025

 * The Artificial Future Trend Micro Security Predictions for 2025
   
   Jan 16, 2025

More Webinars



EDITOR'S CHOICE

Apache's logo on a mobile phone screen
Application Security
Orgs Scramble to Fix Actively Exploited Bug in Apache Struts 2Orgs Scramble to
Fix Actively Exploited Bug in Struts 2
byNate Nelson, Contributing Writer
Dec 19, 2024
5 Min Read

Cute bug on a leaf
Vulnerabilities & Threats
Fortinet Addresses Unpatched Critical RCE VectorFortinet Addresses Unpatched
Critical RCE Vector
byTara Seals, Managing Editor, News, Dark Reading
Dec 19, 2024
2 Min Read
Pipes in an industrial setting
Vulnerabilities & Threats
OT/ICS Engineering Workstations Face Barrage of Fresh MalwareOT/ICS Engineering
Workstations Face Fresh Malware Barrage
byBecky Bracken, Senior Editor, Dark Reading
Dec 19, 2024
1 Min Read

Reports

 * Managing Third-Party Risk Through Situational Awareness
   
   Jul 31, 2024

 * 2024 InformationWeek US IT Salary Report
   
   May 29, 2024

More Reports
Webinars

 * Securing Your Cloud Data Across the Attack Timeline
   
   Jan 15, 2025

 * The Artificial Future Trend Micro Security Predictions for 2025
   
   Jan 16, 2025

More Webinars
White Papers

 * Delivering Incident Response Excellence: How Wipro enhances customer services
   with automated investigation and response

 * Top 10 CI/CD Security Risks: The Technical Guide

 * Frost Radar: Cloud Security Posture Management, 2024

 * 6 Key Requirements of Multicloud Security

 * SecOps Checklist

More Whitepapers






DISCOVER MORE

Black HatOmdia

WORKING WITH US

About UsAdvertiseReprints

JOIN US


Newsletter Sign-Up

FOLLOW US



Copyright © 2024. This website is owned and operated by Informa TechTarget, part
of a global network that informs, influences and connects the world’s technology
buyers and sellers. All copyright resides with them. Informa PLC’s registered
office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales.
TechTarget, Inc.’s registered office is 275 Grove St. Newton, MA 02466.

Home|Cookie Policy|Privacy|Terms of Use
Cookies Button


ABOUT COOKIES ON THIS SITE

We and our partners use cookies to enhance your website experience, learn how
our site is used, offer personalised features, measure the effectiveness of our
services, and tailor content and ads to your interests while you navigate on the
web or interact with us across devices. By clicking "Continue" or continuing to
browse our site you are agreeing to our and our partners use of cookies. For
more information seePrivacy Policy
CONTINUE




COOKIE POLICY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Always Active

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

FUNCTIONAL COOKIES

Always Active

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

TARGETING COOKIES

Always Active

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices