CYBERTHREAT LANDSCAPE IN SOUTH AFRICA - Accenture

Page created by Gary Singh
 
CONTINUE READING
CYBERTHREAT LANDSCAPE IN SOUTH AFRICA - Accenture
INSIGHT INTO THE
CYBERTHREAT
LANDSCAPE
IN SOUTH AFRICA
CYBERTHREAT LANDSCAPE IN SOUTH AFRICA - Accenture
2 | INSIGHT INTO THE CYBERTHREAT LANDSCAPE IN SOUTH AFRICA
CYBERTHREAT LANDSCAPE IN SOUTH AFRICA - Accenture
EXECUTIVE SUMMARY
As use, and reliance on technology,   In this report, iDefense, an
the Internet and smartphones          Accenture security intelligence
grows in South Africa, so does the    company, looks at the trends and
attack surface and the opportunity    incidents from 2019, identifying
for cyberthreat actors. In 2019,      the reasons for these attacks,
South Africa saw a spike in           and suggesting ways in which
cyberattacks on all fronts—banks,     businesses in South Africa can
Internet service providers (ISPs),    better prepare themselves to
utilities and ecommerce platforms     defend against them.
were hit, as were consumers.

                                INSIGHT
                                 INSIGHTINTO
                                         INTOTHE
                                             THECYBER
                                                 CYBERTHREAT
                                                      THREAT LANDSCAPE IN SOUTH AFRICA | 3
                                                 Copyright © 2020 Accenture. All rights reserved.
CYBERTHREAT LANDSCAPE IN SOUTH AFRICA - Accenture
OVERVIEW
South Africa experienced a cross-industry spike in cyber attacks in 2019. The following
facts and figures, taken from a variety of sources over the past 12 months, indicate the
scale of the problem:

•    Cybersecurity company Kaspersky has             •      Card-not-present (CNP) fraud on South
     noted that malware attacks in South                    African-issued credit cards remained
     Africa increased by 22 percent1 in the                 the leading contributor to gross fraud
     first quarter of 2019 compared to the                  losses in the country, accounting for
     first quarter of 2018, which translates                79.5 percent of all losses. 4
     to just under 577 attempted attacks per
     hour.                                           •      South Africa has seen an increase
                                                            of more than 100 percent in mobile
•    Android mobile phones in South Africa                  banking application fraud.5
     were the second most targeted2 by
     banking malware, second only to those
                                                     In addition to these worrying general
     in Russia.
                                                     trends, 2019 was a year in which a range
                                                     of different threat actors found success
•    Virtual-currency-related crime is on
     the rise,3 with hackers increasingly            when attacking high-profile South African
     using people’s phones to mine                   targets, from ISPs to electricity providers,
     cryptocurrencies.                               as the following section shows.

4 | INSIGHT INTO THE CYBER
                     CYBERTHREAT
                           THREATLANDSCAPE
                                 LANDSCAPEIN
                                           INSOUTH
                                             SOUTHAFRICA
                                                   AFRICA
Copyright © 2020 Accenture. All rights reserved.
TIMELINE OF NOTABLE
ATTACKS
February 2019: A South African energy              35 instances in 17 countries in which North
supplier suffered two security breaches            Korean threat actors used cyber attacks
in quick succession. In the first, a staff
                     6
                                                   to illegally raise funds.9 The majority
member incurred an infection from                  of these countries were developing
the information stealer AZORult after              countries, and South Africa was on the
downloading a game from the Internet.              list. These incidents took the form of
In the second, a security researcher               attacks through the Society for Worldwide
discovered an unsecured database                   Interbank Financial Telecommunication
containing sensitive information.                  (SWIFT) system which is used to transfer
                                                   money between banks; the theft of
July 2019: The South African Civil Aviation        cryptocurrency by attacking both
Authority (SACAA) reported a failure of            exchanges and users; and the mining
some of its IT systems. A representative
                         7                         of cryptocurrency. A bank in Africa was
announced that “some files had suspicious          though to have been a victim of a SWIFT-
characteristics”, resulting in some servers        based attack, but South African banks
being disconnected from the network by             denied any security breaches.
SACAA.
                                                   September 2019: Garmin South Africa
July 2019: Ransomware infected a                   disclosed that sensitive customer payment
provider of pre-paid electricity. The
                                 8                 data entered into its shopping portal, shop.
malware encrypted the company’s internal           garmin.co.za, had been stolen.10 Magecart
network, Web applications and official             is a type of cyberattack in which malicious
website, leaving customers without power.          code is implanted on ecommerce sites
The infection occurred on July 24, which           to steal credit card information as people
is the day before a standard payday for            transact online. This Magecart incident
many South Africans when many purchase             affected 6,700 South African customers.
new electricity packages for the upcoming          The stolen data contained payment
month.                                             information, including card numbers,
                                                   expiration dates and CVV codes, first and
August 2019: The United Nations                    last names, physical addresses, phone
announced an investigation into at least           numbers and e-mail addresses.

                                             INSIGHT INTO THE CYBERTHREAT LANDSCAPE IN SOUTH AFRICA | 5
                                                             Copyright © 2020 Accenture. All rights reserved.
Such stolen data often finds its way to Dark         a ransomware attack, but it was later
Web online marketplaces where threat                 established that nothing was encrypted.
actors purchase it and use it to defraud             A group calling itself Shadow Kill Hackers
victims.                                             claimed responsibility and attempted to
                                                     extort its victim. The group also claimed
September 2019: On September 21,                     to have gained access to the networks
2019, one of South Africa’s largest ISPs             of a South African hotel accommodation
suffered a distributed denial of service             service. The city noted that the attack
(DDoS) attack lasting two days. The       11         was carefully timed to coincide with city
attack also targeted another South African           month-end processes affecting supplier
ISP. The attack resulted in clients losing           and customer payments.
connectivity or receiving degraded
performance throughout the weekend.                  October 2019: Also in October, several
The attack technique, known as “carpet               South African banks, as well as financial
bombing”, sends junk traffic to random IP            institutions in Singapore and Scandinavia,
addresses in a target network, facilitating          suffered DDoS attacks, resulting in a loss
a DDoS attack. Attackers have used this              of service.13 Threat actors issued a ransom
method for many years but use spiked in              note pretending to be Russian threat actor
2018 due to the proliferation of stresser            groups Fancy Bear and Cozy Bear. This
and booter (on-demand DDoS attack)                   attack was similar to a 2017 campaign
services. Threat actors have previously              in which threat actors targeted backend
used such services to take down ISPs                 servers rather than public websites,
in other developing countries, such as               knowing that such servers were less
Cambodia and Liberia.                                likely to have DDoS mitigation protection.
                                                     The DDoS attacks occurred on payday,
October 2019: A breach of a major                    resulting in delayed paychecks, which
South African city network resulted in               suggests that threat actors planned the
unauthorised access to its systems.12                attacks to cause maximum disruption.
Officials said the attack affected its call
centers, website and online platforms.
News sources reported this incident as

6 | INSIGHT INTO THE CYBER
                     CYBERTHREAT
                           THREATLANDSCAPE
                                 LANDSCAPEIN
                                           INSOUTH
                                             SOUTHAFRICA
                                                   AFRICA
Copyright © 2020 Accenture. All rights reserved.
WHY IS SOUTH AFRICA
SUCH AN ATTRACTIVE
TARGET?
Threat actors may perceive South African organisations as having lower defensive
barriers than companies in more developed economies. They may also believe that
they have a lower chance of being caught or prosecuted. iDefense suggests that
the increased focus on South Africa by cyberthreat actors is due to the following
interconnected factors:

•   Lack of investment in cyber security:              scrutiny of its impact on privacy and
    South Africa struggles with high crime             freedom of expression has resulted
    rates, inequality and poverty, high                in delays. In addition, while the South
    unemployment and a shortage of                     African Police Service is now also
    skilled labor. While many developing               empowered to act against such crimes,
    economies consider cyber security                  a lack of cybercrime training may
    a necessity, businesses often cannot               cause challenges in the short term.
    invest sufficient funds. Those that
    can invest, face shortages of trained         •    Poor public knowledge of cyber
    cybersecurity practitioners. This                  threats: South Africa has the second
    hampers South Africa’s ability to put              highest GDP15 and operates the second
    measures in place to prevent and                   fastest Internet16 in Africa. Investment
    mitigate advanced threats.                         in new tech startups is booming17
                                                       and the country is employing
•   Developing cybercrime legislation                  technological solutions to achieve
    and law enforcement training:                      a vast array of business and social
    Developing countries often lack                    needs. However, iDefense analysts
    comprehensive cybercrime                           note that South African Internet users
    legislation , making them safe havens
              14
                                                       are inexperienced and less technically
    for illegal operations. South Africa               alert than users in other nations.
    has been slow to adopt cybercrime
    legislation. While the National
    Assembly adopted the Cyber Crimes
    Bill in January 2020, intense public

                                            INSIGHT
                                             INSIGHTINTO
                                                     INTOTHE
                                                         THECYBER
                                                             CYBERTHREAT
                                                                  THREAT LANDSCAPE IN SOUTH AFRICA | 7
                                                             Copyright © 2020 Accenture. All rights reserved.
One report concluded that a worrying                                                                                                                                     in South African companies . After
   31 percent of South Africans thought                                                                                                                                     conducting a survey of South African
   that a cyber threat that encrypts files                                                                                                                                  IT professionals and senior executives,
   and demands payments is a Trojan                                                                                                                                         one recent report concluded that “We
   virus, and that more than 50 percent of                                                                                                                                  have found that organisations have
   respondents were not aware of multi-                                                                                                                                     hugely underestimated their exposure
   factor authentication or its benefits. As                                                                                 18
                                                                                                                                                                            to applications, which could have
   an increasing proportion of the population                                                                                                                               inherent risk to business”. The use
   begins connecting to the Internet for                                                                                                                                    of personal devices or applications
   the first time, this inexperience paired                                                                                                                                 on business networks can pose a
   with increased exposure is a potent                                                                                                                                      significant risk, providing gateways
   combination that cyber criminals will try                                                                                                                                for the deployment of ransomware or
   to exploit. While threat actors are still                                                                                                                                other infection vectors on a network.
   attempting to exploit digital platforms
   such as banking sites or other places                                                                                                                       •            Threat actors are taking notice:
   that store financial data, the mitigation                                                                                                                                iDefense analysts note that between
   strategies these entities deploy are usually                                                                                                                             2010 and 2014 they rarely saw any
   robust—it is easier to target individuals,                                                                                                                               Dark Web threat actors mentioning
   due to their low levels of technical                                                                                                                                     South Africa (see Exhibit 1). However,
   knowledge.                                                                                                                                                               mentions picked up slightly between
                                                                                                                                                                            2014 and 2016. Since 2016 there
   •           The use of shadow IT: iDefense                                                                                                                               has been a much higher focus on
               analysts note that shadow IT—the                                                                                                                             South Africa among the criminal
               use of applications and infrastructure                                                                                                                       underground.
               without the knowledge of an
               enterprise’s IT department—is rife                                                                                                              iDefense analysts note that attacks against

   250

   200

   150

   100

       50

       0

         10         10         10         11         11         11         12         12         12         13        13        13         14        14         15         15         15        16         16         16        17         17         17         18         18        19        19            20
      20         20         20         20         20         20         20         20         20         20        20        20         20        20         20         20         20        20         20         20        20         20         20         20         20        20        20            20
    2-         6-         0-         2-         6-         0-         2-         6-         0-         2-        6-        0-         2-        0-         2-         6-         0-        2-         6-         0-        2-         6-         0-         2-         6-        3-        7-            1-
  -0        -0         -1         -0         -0         -1         -0         -0         -1         -0        -0        -1         -0        -1         -0         -0         -1        -0         -0         -1        -0         -0         -1         -0       0 -0       1 -0      1 -0           -0
22      2 4        2 4        2 3        2 5        2 5        2 4        2 5        2 5        2 4        2 6       2 6       2 5        2 7        26        2 8        2 8        2 7       2 8        2 8        2 7       2 9        2 9        2 8        3         0          0             20

             Exhibit 1: Mentions of “South Africa” between 2010 and 2020 on Dark Web

   8 | INSIGHT INTO THE CYBERTHREAT LANDSCAPE IN SOUTH AFRICA
   Copyright © 2020 Accenture. All rights reserved.
South Africa are consistent with attacks          •    Malicious actors use rudimentary
in other world economies. These attacks                scams like BEC scams, phishing,
include the use of ransomware, banking                 vishing and smishing abundantly
Trojans, business e-mail compromise (BEC)              against South African targets,
scams and carding fraud. The difference                especially small, underequipped
is that South Africa is experiencing these             businesses. The use of these scams
threats in bulk for the first time. When               remains universal, especially against
iDefense examined the Scandinavian                     developing countries, as they have less
threat landscape, it found malicious                   resilience to these scams than
actors could still use rudimentary scams               more-advanced economies.
successfully because the targeted
businesses and people had not been                •    The use of ransomware has increased
exposed to them before. This same trend                in popularity. Ransomware is widely
is playing out in South Africa. However, the           available for sale across the criminal
threat is amplified as South Africans are              underground for as little as US$100.
inherently less aware of cyber threats than            This enables unskilled threat actors
the populations of some other nations.                 to conduct malicious activities simply
                                                       by purchasing the tools they need.
iDefense highlights the following                      iDefense also observed a new trend
areas noted in the targeting of South                  where advanced threat actor groups
African organisations on cybercriminal                 target larger entities, such as city
underground forums:                                    administrations, as such targets can
                                                       pay higher ransoms.
•   The rapid uptake in recent years in
    the use of mobile financial services          •    Some threat actors may consider
    (MFS) among South Africans leaves                  South Africa a testing ground for
    users vulnerable to banking Trojans                malware.19 As cybersecurity measures
    and Android banking malware, the use               are not as robust amongst private and
    of which has been steadily increasing              public enterprises in South Africa as
    among threat actors since 2017. In                 they are in other countries globally,
    particular, LokiBot, RedAlert and                  some actors may test their tools and
    Anubis have been under constant                    techniques against South African
    development and are widely available               targets before deploying them against
    among criminal threat actors.                      sophisticated targets.

                                            INSIGHT
                                             INSIGHTINTO
                                                     INTOTHE
                                                         THECYBER
                                                             CYBERTHREAT
                                                                  THREAT LANDSCAPE IN SOUTH AFRICA | 9
                                                             Copyright © 2020 Accenture. All rights reserved.
WHAT CAN BE DONE?
As cybercrime figures continue to rise,              •       Prioritise protecting against people-
South African organisations need to get                      based attacks: Counteracting internal
serious about defending their businesses                     threats is still one of the biggest
and protecting their customers. iDefense                     challenges business leaders face today.
recommends a number of actions: making                       Increases in phishing, ransomware and
use of security and threat intelligence,                     malicious insider attacks mean that
protecting against internal threats and                      organisations need to place greater
people-based attacks, and focussing on                       emphasis on nurturing a security-first
compliance—applying standards and best                       culture. Training and education are
practices.                                                   essential to reinforcing safe behaviors,
                                                             both for people within an organisation
•    Makes use of security and threat                        and across entire business ecosystems.
     intelligence: This has previously
     been the reserve of large, well-funded          •       Focus on compliance: Many
     organisations, but is now accessible                    organisations already have tools and
     and affordable to most businesses.                      solutions in place to help them with
     Accenture’s ninth annual report on                      data compliance. However, these
     “The Cost of Cybercrime” , reported20
                                                             tools are often configured incorrectly.
     that security intelligence and threat                   When business tools and services are
     sharing provides the greatest cost                      installed and configured correctly,
     savings compared with levels of                         data compliance follows automatically.
     spending (US$2.26 million). Security                    Particular attention should be paid to
     and threat intelligence is not only                     the reduction of shadow IT.
     an important enabling technology
     for both discovery and investigation            •       Prepare for when, not if: The previous
     activities, it is a valuable source of                  points all relate to detection, and
     information to understand threats                       “pre-breach” preparation. For post-
     and better use resources against                        breach incidents, such as those listed
     anticipated attacks.                                    in this report, put clear procedures in
                                                             place, including an incident-response
                                                             capability, post-incident analysis,
                                                             backed-up data, anti-DDoS measures
                                                             and Cloud access security brokers.

10 | INSIGHT INTO THE CYBER
                      CYBERTHREAT
                            THREATLANDSCAPE
                                  LANDSCAPEIN
                                            INSOUTH
                                              SOUTHAFRICA
                                                    AFRICA
Copyright © 2020 Accenture. All rights reserved.
REFERENCES

1    https://www.fin24.com/Companies/ICT/major-spike-in-sa-cyber-attacks-over-10-000-attempts-
     a-day-security-company-20190429

2    https://www.forbes.com/sites/tobyshapshak/2019/05/09/south-africa-has-second-most-
     android-banking-malware-attacks-as-cyber-crime-increases/#47a6a6d85d77

3    http://www.itwebafrica.com/security/514-south-africa/246610-virtual-currency-crime-spikes-in-
     south-africa

4    https://www.sabric.co.za/media-and-news/press-releases/sabric-annual-crime-stats-2018/

5    http://www.itwebafrica.com/home-pagex/opinion/246661-counting-the-cost-of-cybercrime

6    https://www.bleepingcomputer.com/news/security/power-company-has-security-breach-due-
     to-downloaded-game/

7    https://www.fin24.com/Companies/Industrial/sa-civil-aviation-authority-launches-investigation-
     into-possible-cyber-hack-20190708

8    https://www.zdnet.com/article/ransomware-incident-leaves-some-johannesburg-residents-
     without-electricity/

9    https://apnews.com/ece1c6b122224bd9ac5e4cbd0c1e1d80

10   https://www.bleepingcomputer.com/news/security/garmin-sa-shopping-portal-breach-leads-to-
     theft-of-payment-data/

11   https://www.zdnet.com/article/carpet-bombing-ddos-attack-takes-down-south-african-isp-for-
     an-entire-day/

12   https://www.zdnet.com/article/city-of-johannesburg-held-for-ransom-by-hacker-gang/

13   https://www.thesslstore.com/blog/cyber-attacks-hit-the-city-of-johannesburg-and-south-
     african-banks/

14   https://unctad.org/en/pages/PressRelease.aspx?OriginalVersionID=238

15   https://en.wikipedia.org/wiki/List_of_African_countries_by_GDP_(nominal)

16   https://moguldom.com/220816/10-african-countries-with-the-fastest-broadband-speeds/

17   https://www.forbes.com/sites/tobyshapshak/2020/01/20/african-tech-start-ups-have-record-
     investment-year-in-2019/#56e6b62832f9

18   https://www.itweb.co.za/content/4r1lyMRoaVAqpmda

19   https://www.itweb.co.za/content/wbrpOMgPAkeqDLZn

20   “Addressing the growing spectre of cyber crime in Africa: evaluating measures adopted by
     South Africa and other regional role players”, Fawzia Cassim. https://www.accenture.com/_
     acnmedia/pdf-96/accenture-2019-cost-of-cybercrime-study-final.pdf

                                             INSIGHT
                                              INSIGHTINTO
                                                      INTOTHE
                                                          THECYBER
                                                              CYBERTHREAT
                                                                   THREAT LANDSCAPE IN SOUTH AFRICA | 11
                                                              Copyright © 2020 Accenture. All rights reserved.
ABOUT ACCENTURE                                                                  AUTHORS

Accenture is a leading global professional services company,                     WANDILE MCANYANA
providing a broad range of services and solutions in strategy,                   Security Lead, Accenture in Africa
consulting, digital, technology and operations. Combining                        wandile.mcanyana@accenture.com
unmatched experience and specialised skills across more
than 40 industries and all business functions—underpinned
                                                                                 CLIVE BRINDLEY
by the world’s largest delivery network—Accenture works at
                                                                                 Senior Manager, Security, Accenture in Africa
the intersection of business and technology to help clients
                                                                                 clive.brindley@accenture.com
improve their performance and create sustainable value for
their stakeholders.
                                                                                 YUSOF SEEDAT
                                                                                 Head of Global Geographies, Accenture Research
With 505,000 people serving clients in more than 120
                                                                                 yusof.seedat@accenture.com
countries, Accenture drives innovation to improve the way
the world works and lives.

Visit us at www.accenture.com

                                                                                 MAIN CONTRIBUTORS

                                                                                 PAUL MANSFIELD
                                                                                 Cyber Threat Intelligence Analyst, iDefense
                                                                                 paul.a.mansfield@accenture.com

                                                                                 THOMAS WILLKAN
                                                                                 Cyber Threat Intelligence Analyst, iDefense
                                                                                 thomas.willkan@accenture.com

Copyright © 2020 Accenture                 The views and opinions expressed in this document are meant to stimulate thought and discussion.
All rights reserved.                       As each business has unique requirements and objectives, the ideas should not be viewed as
                                           professional advice with respect to your business. This document makes descriptive reference to
Accenture, its logo, and High              trademarks that may be owned by others. The use of such trademarks herein is not an assertion of
Performance Delivered are                  ownership of such trademarks by Accenture and is not intended to represent or imply the existence
trademarks of Accenture.                   of an association between Accenture and the lawful owners of such trademarks.
You can also read