APTS cyber-attacks target African governments, telcos, energy
Kaspersky, a global cybersecurity firm, is keeping a close eye on advanced persistent threats (APTs) and nine active threat actors targeting African organisations.
Kaspersky researchers' intelligence has identified government, energy, and telecommunications as the primary targets in African countries.
APT groups are long-term, targeted cyber-attacks in which intruders obtain network access and go undiscovered for a lengthy period of time. APT attacks are typically initiated to steal extremely sensitive data.
These APT organisations are frequently driven by espionage, financial gain, or, in some cases, hacktivism.
According to Kaspersky intelligence, MuddyWater, FruityArmor, and Sidewinder are among the region's most prominent groups.
Kaspersky, which says it protects over a billion devices worldwide from cyberattacks, collaborates with law enforcement and offers intelligence to help them track down these sophisticated hackers.
These threat actors, according to the company, use a variety of methods to infiltrate their targets in the region.
Social engineering is a typical method employed on social media or via email, such as placing a bogus job advertisement for software developers.
According to Amin Hasbini, head of Kaspersky's global research and analysis team for the Middle East, Turkey, and Africa, said it is critical to keep up with these sophisticated syndicates and stop corporate espionage.
“The current geopolitical climate is a hotbed for APT activity, therefore, investigating these attacks and gaining intelligence on their movement is vital for security teams and corporations in Africa. Our research allows businesses and government entities to determine the significance of the threat posed, understand the attackers’ next move and accordingly be able to take the appropriate security steps to protect themselves,” he said.