Kenya cyber attacks grow in sophistication

December 6, 2016 6:05 am6 commentsViews: 19
Global cybercrime leader arrested

Global cybercrime leader arrested

NAIROBI, (CAJ News) – THE recent hacking Kenya’s Government has highlighted the increasing attacks in the country and placed a spotlight on the vulnerabilities and losses both government and online businesses are facing.

Kenya is losing about US$146 million every year according to a recent cyber security report on Kenya.

It’s not only the frequency of the cyber attacks happening in Kenya at the moment, but also the size and sophistication of these assaults that government and business need to face up to.

“Kenya and its surrounding countries has continuously attracted nefarious activities by cyber criminals, and the proliferation in distributed denial-of-service (DDoS) attacks in the region is today as much a reality as it is globally,” says Bryan Hamman, Territory Manager for sub-Saharan Africa at Arbor Networks.

The company is the world’s leading provider of DDoS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research.

Mark Campbell, consulting engineer for sub-Saharan Africa, points out it is especially Kenya’s growing financial, telecommunication and manufacturing sectors that are becoming popular targets for cybercrime.

He says from a wider security standpoint, one of the greatest threats organisations still encounter is social engineering, which is a method used by threat actors to trick people into giving up confidential information.

“This is especially prevalent in the financial industry where fraudsters use social engineering to insert themselves into financial transactions using phishing, online forms, hijacked DNS sessions, SMS and USSD services,” Campbell highlights.

According to Paul Roy Owino, President of Information Technology, Security and Assurance Kenya currently records up to 3 000 cyber-related crimes per month, these include banking fraud, money transfer (M-pesa), to interference with personal data by hackers.

CAJ News

Tags:

Leave a Reply