TechCentralTechCentral
    Facebook Twitter YouTube LinkedIn
    Facebook Twitter LinkedIn YouTube
    TechCentralTechCentral
    NEWSLETTER
    • News

      Rain in embarrassing climbdown over Telkom statement

      16 August 2022

      Coal miner Seriti plans R12-billion Mpumalanga wind farm

      16 August 2022

      Signal warns attackers may have made off with users’ phone numbers

      16 August 2022

      South Africa’s ‘silent revolution’ as those with cash go solar

      15 August 2022

      SA coal giant Seriti Resources in pivot to renewables

      15 August 2022
    • World

      Semiconductor boom turns to bust

      16 August 2022

      Tencent plans to offload R400-billion Meituan stake: sources

      16 August 2022

      Ether leaps higher on verge of Merge

      16 August 2022

      Institutions eye crypto but retail investors remain nervous

      15 August 2022

      Tencent woes mount, even after $560-billion selloff

      12 August 2022
    • In-depth

      African unicorn Flutterwave battles fires on multiple fronts

      11 August 2022

      The length of Earth’s days has been increasing – and no one knows why

      7 August 2022

      As Facebook fades, the Mad Men of advertising stage a comeback

      2 August 2022

      Crypto breaks the rules. That’s the point

      27 July 2022

      E-mail scams are getting chillingly personal

      17 July 2022
    • Podcasts

      Qush on infosec: why prevention is always better than cure

      11 August 2022

      e4’s Adri Führi on encouraging more women into tech careers

      10 August 2022

      How South Africa can woo more women into tech

      4 August 2022

      Book and check-in via WhatsApp? FlySafair is on it

      28 July 2022

      Interview: Why Dell’s next-gen PowerEdge servers change the game

      28 July 2022
    • Opinion

      No reason South Africa should have a shortage of electricity: Ramaphosa

      11 July 2022

      Ntshavheni’s bias against the private sector

      8 July 2022

      South Africa can no longer rely on Eskom alone

      4 July 2022

      Has South Africa’s advertising industry lost its way?

      21 June 2022

      Rob Lith: What Icasa’s spectrum auction means for SA companies

      13 June 2022
    • Company Hubs
      • 1-grid
      • Africa Data Centres
      • Altron Document Solutions
      • Amplitude
      • Atvance Intellect
      • Axiz
      • BOATech
      • CallMiner
      • Digital Generation
      • E4
      • ESET
      • Euphoria Telecom
      • IBM
      • Kyocera Document Solutions
      • Microsoft
      • Nutanix
      • One Trust
      • Pinnacle
      • Skybox Security
      • SkyWire
      • Tarsus on Demand
      • Videri Digital
      • Zendesk
    • Sections
      • Banking
      • Broadcasting and Media
      • Cloud computing
      • Consumer electronics
      • Cryptocurrencies
      • Education and skills
      • Energy
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Motoring and transport
      • Public sector
      • Science
      • Social media
      • Talent and leadership
      • Telecoms
    • Advertise
    TechCentralTechCentral
    Home»In-depth»Hackers up the ante on SA companies

    Hackers up the ante on SA companies

    In-depth By Sasha Planting6 July 2018
    Facebook Twitter LinkedIn WhatsApp Telegram Email

    While financial services company Liberty may have suffered the biggest data breach ever in South Africa, losing between 20TB and 40TB of data contained in e-mails and attachments, it is not the only listed company to have been targeted by hackers.

    JSE-listed construction materials firm Afrimat has been the target of several hacking attempts. Most recently, a third party contractor inadvertently released a day-zero attack into its network. This is a cyberattack that occurs on the same day a weakness is discovered in software (which means no antivirus software will pick it up), enabling hackers to exploit the gap before a fix becomes available from its creator.

    “We became aware of the attack as it happened and were able to stop it at the point of infection,” says Johan du Plessis, GM of technology systems at Afrimat. Who the hackers were and what their objective was, one can only speculate. “These guys are almost impossible to trace,” he says.

    Our systems picked this up immediately and ensured that it could not be distributed to our other servers and devices on the network

    In another attack, ransomware infected the company’s development server. This is malicious software that blocks access to a computer’s files until a sum of money is paid. “Our systems picked this up immediately and ensured that it could not be distributed to our other servers and devices on the network,” says Du Plessis. “We could then isolate the software before it could do real harm or cause a loss of production.”

    Afrimat was not always so lucky. Two years ago, ransomware infected its entire server environment. “The attack happened on Saturday and we discovered it on the Sunday. We were down for nine hours but we had a disaster recovery plan and were able to get the systems back up before operations began on Monday morning.”

    At that point, J2 came on board and we deployed their layered approach to cybersecurity. “It was a matter of time before one of these attacks caused real damage,” Du Plessis says.

    According to PwC’s Global Economic Crime and Fraud Survey for 2018, South Africa is the second most targeted country in the world when it comes to cyberattacks. The reason for this, says John McLoughlin, CEO of J2 Software, is a combination of naive users, poor policing and immature laws.

    Popi Act

    While South Africa’s Protection of Personal Information (Popi) Act was signed into law in 2013, it has not become fully operational as the regulator is not yet functioning fully. Popi is also not as prescriptive as Europe’s General Data Protection Regulation (GDPR), which became operational at the end of May this year, says McLoughlin.

    The GDPR requires that businesses take steps to protect the personal data and privacy of the EU citizens who are their clients. Unlike PoPI, if something goes wrong and private data falls into the wrong hands, that company is required to inform their clients within 72 hours.

    “The reason you have never heard of data breaches at listed companies is not because they have not happened, it’s because they don’t have to tell you,” adds McLoughlin.

    Afrimat came to recognise that most cyberthreats are activated from within a network — so building the highest wall possible is not effective. “We started small, applying J2’s layered approach to security,” says Du Plessis.

    The first layer included installing antivirus software on every machine and mobile device that accessed the company’s network. The second layer saw Afrimat setting up a system to protect itself from the Web (the system advises which sites employees can and can’t visit and what software they can and can’t download). The third layer focuses on e-mail — the number-one way hackers target businesses and employees. “Every e-mail is scrutinised by the software, with the result that about 60% of mails coming into the company are stopped because they are spam or malicious,” Du Plessis says.

    He adds: “We have not taken these steps because we suspect our staff of malicious attacks. Very often the user acts innocently — by inadvertently clicking, downloading or opening something that is potentially dangerous.”

    A year later, Afrimat added another layer of security in the form of behavioural analytics. This does not mean a beefcake of a man is watching employees’ every move via hidden cameras. Instead a software system called Dtex monitors users’ online behaviour. “We have no interest in what our users are doing until they do something unusual, and it is this that the system flags,” says Du Plessis. “For instance, is someone copying large quantities of data? Are they saving it to an external drive? This is what we want to know.”

    While Afrimat has not had to march anyone off its premises, one Cape Town-based call centre operator has done so, says McLoughlin.

    The call centre ran several concurrent campaigns for financial service providers, with Chinese walls separating each campaign, and one overarching manager. It turned out that one manager began accumulating user data from the different campaigns, which she compiled into a “work” folder. She then uploaded this into her Google drive. This was unusual and the system flagged it as such. “Within an hour she was marched out the building,” McLoughlin says.

    Visibility over your network and what your people are doing is like gold, he adds. The minute someone clicks on something that is compromised, you need to know. “Yet it takes the average company 220 days to know they have been breached.”

    In Liberty’s case, the company knew there had been a breach of its systems because the hackers told them so, and then proved it by publishing some of the information — since removed.

    “It’s scary out there,” says Du Plessis. “It’s not so much about cybersecurity — it’s about cyber resilience. It’s not if, it’s when. And then, are you able to bounce back within four hours with no loss — either physical or reputational?”

    • This article was originally published on Moneyweb and is used here with permission
    Afrimat Liberty Liberty Group top
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email
    Previous ArticleTV white spaces could revolutionise SA telecoms
    Next Article Tech giants are stronger than Paul McCartney

    Related Posts

    African unicorn Flutterwave battles fires on multiple fronts

    11 August 2022

    The length of Earth’s days has been increasing – and no one knows why

    7 August 2022

    As Facebook fades, the Mad Men of advertising stage a comeback

    2 August 2022
    Add A Comment

    Comments are closed.

    Promoted

    HPE SimpliVity: addressing SMBs’ data conundrums

    16 August 2022

    Digital transformation – don’t get caught unprepared

    16 August 2022

    Seven reasons your business needs IP surveillance cameras

    15 August 2022
    Opinion

    No reason South Africa should have a shortage of electricity: Ramaphosa

    11 July 2022

    Ntshavheni’s bias against the private sector

    8 July 2022

    South Africa can no longer rely on Eskom alone

    4 July 2022

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2022 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.