Subscribe

Kenya cyber attacks growing in sophistication; prevention is key


Johannesburg, 01 Dec 2016

It's not only the frequency of the cyber attacks happening in Kenya at the moment, but also the size and sophistication of these assaults that government and business need to face up to.

The recent hacking of Kenya's government in November 2016 has highlighted the increasing attacks in the country and placed a spotlight on the vulnerabilities and losses both government and online businesses are facing - about USD146 million every year, according to a recent cyber security report on Kenya.

This is, in particular, attributed to the fact that the country has shown a major increase in Web-connected devices.

"Kenya and its surrounding countries has continuously attracted nefarious activities by cyber criminals, and the proliferation in distributed denial of service (DDOS) attacks in the region is today as much a reality as it is globally," says Bryan Hamman, territory manager for sub-Saharan Africa at Arbor Networks, the world's leading provider of DDOS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research.

According to Paul Roy Owino, president of IT, Security and Assurance (ISACA), Kenya currently records up to 3 000 cyber-related crimes per month; these include banking fraud and money transfer (M-Pesa), to interference with personal data by hackers.

Reports following the latest major government attack state that local cyber security experts in Kenya are warning of the need to regulate Internet use and management as a national security issue.

Mark Campbell, consulting engineer for sub-Saharan Africa, points out it is especially Kenya's growing financial, telecommunications and manufacturing sectors that are becoming popular targets for cyber crime.

"From a wider security standpoint, one of the greatest threats organisations still encounter is social engineering, which is a method used by threat actors to trick people into giving up confidential information. This is especially prevalent in the financial industry where fraudsters use social engineering to insert themselves into financial transactions using phishing, online forms, hijacked DNS sessions, SMS and USSD services.

"In addition, cyber threats have become a real concern among industrial automation and control systems, especially in the current Internet of things (IOT) era. Attacks on industrial systems are often acted out for monetary, competitive, political or even social gain," he says.

Campbell also highlights that many IOT devices run on open source operating systems (OS) - mainly as this is cheaper to develop, thus making it more affordable with a short time to market.

"However, the result is that the code is poorly written with numerous security vulnerabilities. Of course, the majority of users do not have the time, patience or expertise to test these for vulnerabilities, making many IOT devices - including our home appliances - a threat actor's dream. For example, I had some home IP cameras that had the telnet protocol open by default, with hard-coded and very easy to guess username/password, yet I couldn't find a new version of software for them. Even if I did, could I trust it? What's to say that a hacker hasn't targeted that 'security unaware' vendor? If that vendor's online, upgrade code could be compromised, the attacker has an 'Internet worth of things' he can command and control," notes Campbell.

Hamman adds for the majority of Kenyan private businesses, the most imminent threat today is that their online service is disrupted.

"As any online business knows, your competitor is just one click away, and if your site is not available, you cannot trade. E-commerce sites thus need to be vigilant at all times to protect their availability and profit," he says. "Cyber crimes in these instances are most often motivated by financial gain, exploitation of individuals/brands, and for competitive reasons."

Although government sites are generally not built solely for commerce, Hamman warns that often when cyber criminals take sites offline - be they public or private - they do so as a smokescreen for more devious behaviour. "While site owners are distracted by their Web site being down, cyber criminals use this shift in focus to create a more threatening and targeted DDOS attack on the company or institution, with the purpose of infiltrating the network and holding the victims to ransom for money or political motivations, or to steal valuable data and intelligence, such as flight plans for private or military planes, among others," he explains.

Hamman stresses that companies are also still constantly hit by point of sale (POS) attacks, with the physical skimmers of the past now having evolved into malware in POS systems, that steal and exfiltrate confidential and sensitive information.

"Even as organisations realise both the monetary and reputational threat a security breach can create, seeking an 'all-in-one-box' that automatically takes care of every factor of security simply does not exist. Security is a multi-layer problem that needs to be addressed as such, and CIOs can never assume that a security project has been completed and can now be filed away. Security is a continuous and ongoing process," continues Hamman.

"Most importantly, an organisation needs to have pervasive visibility across its fixed, mobile and cloud-based network feeding into a threat management solution. Security teams need to focus on conversations happening across the network. While an end-point and perimeter security solution is good to have, it can be compromised and manipulated by attackers. The only common point and primary information source that is to be trusted is the network and the traffic flowing across it; only this tells the whole story," says Campbell.

"Also, when under attack, every second counts. You can't be caught on the back foot. Preparation is thus key and organisations need to have people, policies and processes in place so that actionable intelligence and a practised workflow to investigate a breach are kicked off immediately. Information sharing via computer emergency response teams is therefore of importance, as often there are targeted campaigns against certain sectors, or methods are the same."

Hamman ends by warning CIOs they should never assume a single breach or compromise was it, and that it is over. "A DDOS attack is almost always part of a wider strategy. For this reason, the right tools must be in place to understand the breadth and scope of breach. An attacked firm can't just rebuild compromised hosts or servers, as breaches are generally part of a coordinated and well-orchestrated plan. Complex attacks are on the rise."

For more information about Arbor products and solutions in Africa, please contact Bryan Hamman at bhamman@arbor.net.

Arbor Networks

Arbor Networks, the security division of NETSCOUT, helps secure the world's largest enterprise and service provider networks from DDOS attacks and advanced threats. Arbor is the world's leading provider of DDOS protection in the enterprise, carrier and mobile market segments, according to Infonetics Research. Arbor's advanced threat solutions deliver complete network visibility through a combination of packet capture and NetFlow technology, enabling the rapid detection and mitigation of malware and malicious insiders. Arbor also delivers market-leading analytics for dynamic incident response, historical analysis, visualisation and forensics. Arbor strives to be a "force multiplier," making network and security teams the experts. Arbor's goal is to provide a richer picture into networks and more security context so customers can solve problems faster and reduce the risks to their business.

To learn more about Arbor products and services, please follow the company on Twitter @ArborNetworks. Arbor's research, analysis and insight, together with data from the ATLAS global threat intelligence system, can be found at the ATLAS Threat Portal.

Editorial contacts

Chriselna Welsh
Arbor Networks
(+27) 011 202 8400
chriselna.welsh@nu.co.za