South Africa Exposes Continued Vulnerability in Latest Cyber Attack

#hacked #cybersecurity #southafrica #cyberinsurance

The most recent cyberattack on Transnet, the state-owned port and rail operator, offers a glimpse of the tip of the iceberg of cybersecurity problems in South Africa. As with many countries, the power of the economy depends on import/export abilities, and when the ports have to stop it creates a cascade effect that reaches everyone in lack of products, especially food. The week-long shut down due to what was greyly listed as an “IT disruption” halted everything from their communications, payroll, and even their website.

Denys Reva, an Institute for Security Studies SA maritime researcher believes the Transnet attack was likely on their Navis system. Reva indicated: “In the Transnet instance, it seems the attack has disrupted the Navis container operating system, which helps optimise the releasing and accepting of containers.” The reports from Transnet remain sketchy as they stated that no data was compromised, but experts say that it shouldn’t have taken a week to restore everything from backups.

This situation is an example of how vulnerable many of the organizations and businesses are in South Africa. Even with continued cyber attacks in SA and abroad, many simply don’t have a security strategy established for risk analysis, monitoring, and recovery. Independent companies have been experiencing cyber attacks for years and some simply don’t report them for fear of losing their reputation.

Experts in the cybersecurity world have been quietly whispering about the uptick in cyberattacks targeting large utility companies and government agencies. In the case of South Africa, they think the criminals may be taking advantage of the social unrest occurring due to the arrest of former present Jacob Zuma which has resulted in country-wide vandalism and looting. In other words, the focus is on a big event that allows them the ability to put their cyber-attacks in place. Some also speculate that these attacks could be a prelude to something even larger, such as a nuclear power plant which could potentially disable a huge area and require that demand for billions be paid.

Independent businesses look at this type of cyberattack with varying degrees of reservations; some even treating cyber attacks as a kind of “hasn’t happened to us” attitude. Those that are the savviest understand that cybersecurity is a cost of doing business in today’s world and have invested in cybersecurity insurance. The total price of a breach can extend into the millions and since cybersecurity insurance is crafted to address losses from such incidents as business interruption, network damage, and breach of data, it has become one of the trends for many organizations around the globe. In addition to cybersecurity insurance, companies are bringing cybersecurity specialists to analyze their risks establish best practices that can help in reducing the price of the insurance.


Originally published at on August 15, 2021.




CEO of Da Vinci Forensics, a Cyber Security Company. #Cybercrime, #DigitalForensics #Marketing #Digital #Marketing #Risk #Management #Strategy #lifelessons #

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

{UPDATE} True or False Swipe Hack Free Resources Generator

SushiSwap is live on Polygon!

Combining RSA + AES Encryption to secure REST Endpoint With Sensitive Data

Deeper Network Monthly Newsletter:10/01/2020 –10/31/2020

{UPDATE} Weihnachtsspiele Hack Free Resources Generator


{UPDATE} Maleficent Free Fall Hack Free Resources Generator

[case study#2] SQL injection lets me extract data from the database

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Sharon @ Da Vinci Cybersecurity

Sharon @ Da Vinci Cybersecurity

CEO of Da Vinci Forensics, a Cyber Security Company. #Cybercrime, #DigitalForensics #Marketing #Digital #Marketing #Risk #Management #Strategy #lifelessons #

More from Medium

The log4j vulnerability shows vulnerability management can’t come down to only a scan

What Do I Do Now?

The Few Chosen: CTF Write-Up