Source: EWN

The days of frantically looking up matric marks in newspapers each year is over and many have welcomed the decision.

The Department of Basic Education made the announcement on Tuesday.

Instead, pupils will have to go to their high schools to collect their results to find out whether they have passed or not.

The department cited the introduction of the Protection of Personal Information Act (POPIA), which came into effect in July last year as the reason behind the decision.

It added that this was done to respect the right to privacy to protect against unlawful collection, retention, dissemination and use of personal information.

Most members of the public have welcomed the decision, especially as a way to protect the mental health of many children who feel overwhelmed by the publishing of results.

Source: MyBroadband

Popular online store OneDayOnly was the victim of a large robbery on Friday morning, with criminals using large trucks to carry all the stolen products.

MyBroadband learned that the criminals left OneDayOnly’s warehouse in multiple 8-ton trucks shortly after the start of the company’s Black Friday promotions.

Black Friday is the biggest online shopping day for many online stores, and OneDayOnly also had an extensive campaign during this period.

Criminals, therefore, knew that it was a good time to strike if they wanted to be assured of a large amount of valuable stock.

OneDayOnly confirmed that one of its warehouses had been the target of a robbery.

“Luckily, our Black Friday deals were only marginally affected, as any impacted stock quantities were adjusted to the new availability,” a OneDayOnly spokesperson said.

“Most of our products on offer are still with the suppliers, as ‘not sitting on stock’ is a core component of our model.”

The e-commerce company said the affected distribution centre was fully operational again by midday on Friday.

“We are working with authorities to assess the damage and will communicate with affected shoppers early next week,” the spokesperson said.

 

By Amritesh Anaand, practise lead for unified Communication at In2IT Technologies

Cybercrime is a growing threat to businesses globally, and South Africa is no exception. The country ranks third in the world for the highest number of users experiencing targeted ransomware attacks. No industries or sectors are immune, and a breach can cost companies millions in lost revenue, not to mention the cost (and time) to recover. Cyber insurance is a growing trend, aimed at helping mitigate the risk around cyber threats. However, while it can help businesses to handle some of the financial fallout from an attack, it is by no means a replacement for a comprehensive data management and protection strategy.

The rise of cyber insurance

The last decade has seen thousands of highly publicised and cost-heavy cyber incidents, which have impacted organisations across the globe as well as a range of industry sectors. Most recently in South Africa, the Department of Justice was hit by a ransomware attack in September, and the recovery from the attack is ongoing after several weeks. No company or industry is immune, and since businesses are heavily reliant on technology and data to operate, a successful ransomware attack can be devastating financially.

This is where cyber insurance comes in, helping the primary risks associated with cyber incidents, including network security and privacy liability, network business interruption, media liability, and errors and omissions. Cyber insurance is designed to provide first- and third-party coverage to mitigate risk exposure by offsetting the costs involved with the recovery of cyber losses.

Cyber insurance is not a security strategy

Coverage from cyber insurance may include losses from network security breaches, data and systems recovery costs, legal expenses and third-party indemnification related to data breaches, as well as business interruption costs. However, financial risk is only one element of the cost associated with a cyberattack. The reputational damage, which no insurance policy can mitigate, can be devastating after the fact. In this instance, as with many others, prevention is always better than cure.

Preventing a breach of your network and its systems requires protection against a variety of cyberattacks. For each attack, the appropriate countermeasure must be deployed/used to deter it from exploiting a vulnerability or weakness. The first line of defence for any organisation is to assess and implement security controls, through a multi-layered security approach that considers the following six elements.

1. Education and awareness

One of the most common ways cybercriminals gain access to your data is through your employees. They’ll send fraudulent emails impersonating someone in your organisation and will either ask for personal details or for access to certain files. Links often seem legitimate to an untrained eye and it’s easy to fall into the trap. This is why employee awareness is vital.

2. Frequent software and systems updates

Often, cyberattacks happen because your systems or software aren’t fully up to date, leaving weaknesses. Cybercriminals exploit these weaknesses to gain access to your network. Once they are in – it’s often too late to take preventative action.

3. Endpoint protection

Mobile devices, tablets and laptops that are connected to corporate networks give access paths to security threats. These paths need to be protected with specific endpoint protection software.

4. Data security

There are so many different types of sophisticated data breaches and new ones surface every day and even make comebacks. Putting your network behind a firewall is one of the most effective ways to defend yourself from any cyberattack. A firewall system will block any brute force attacks made on your network and/or systems before it can do any damage.

5. Identity and access

Physical access remains a critical element and having control over who can access your network is important. If somebody can simply walk into your office and plug in a USB key containing infected files into one of your computers, allowing them access to your entire network or infect it, then systems are not secure.

6. Strong password policies

Having the same password setup for everything can be dangerous. Once a hacker figures out your password, they now have access to everything in your system and any application you use. Having different passwords set up for every application you use is a real benefit to your security and changing them often will maintain a high level of protection against external and internal threats.

Insurance is the fallback

As with anything in life, insurance should be a last resort when all else has failed. It can help to mitigate some of the financial damage of an attack, but it cannot form the basis of a cybersecurity strategy, as this places businesses at risk for other areas, including compliance.

However, it can be difficult to know where to begin when it comes to protecting your business from cybercrime and cyberattacks. There is so much information out there that it can become overwhelming, especially when we have so much interrelated information. The right technology partner is essential to delivering a cybersecurity solution that works for a business and its employees.

 

By Babalo Ndenze for EWN

The Special Investigating Unit (SIU) said one company owner used over 1 000 ID numbers to defraud the Unemployment Insurance Fund (UIF)’s temporary employment relief scheme (TERS) of over R100-million.

The SIU on Wednesday told Parliament’s finance watchdog Scopa that the UIF was the victim of fraud by companies and state employees.

SIU chief forensic investigator Johnny le Roux said a certain Mr Simbini, a private individual and sole director of a company called Impossible Services, submitted over 6,000 TERS claims for non-existent employees.

“According to the records, the only registered employee of Impossible Services was Simbini himself. There was, therefore, no other registered employees for Impossible Services that TERS money could be claimed for. The money was paid into the bank account of Impossible Services and at that stage, R110 million was preserved.”

Le Roux said phase one of the investigation focused on state employees who received a TERS benefit during COVID-19.

He said at least 6 000 employees were identified within 24 government departments with the assistance of the Department of Public Service and Administration.

The Eastern Cape had over 500 cases: “In the Eastern Cape, you would notice that there were at least 501 matters in eleven departments amounting to R106-million.”

The SIU said a number of officials had been charged and disciplined, while millions of rands had recovered.

 

Ransomware is now a one-delivery system

Sophos, a global leader in next-generation cybersecurity, has published the Sophos 2022 Threat Report, which shows how the gravitational force of ransomware’s black hole is pulling in other cyberthreats to form one massive, interconnected ransomware delivery system – with significant implications for IT security.

The report provides a unique multi-dimensional perspective on security threats and trends facing organisations in 2022.

The Sophos 2022 Threat Report analyses the following key trends:

1. Over the coming year, the ransomware landscape will become both more modular and more uniform, with attack “specialists” offering different elements of an attack “as-a-service” and providing playbooks with tools and techniques that enable different adversary groups to implement very similar attacks. According to Sophos researchers, attacks by single ransomware groups gave way to more ransomware-as-a-service (RaaS) offerings during 2021, with specialist ransomware developers focused on hiring out malicious code and infrastructure to third-party affiliates. Some of the most high profile ransomware attacks of the year involved RaaS, including an attack against Colonial Pipeline in the U.S. by a DarkSide affiliate. An affiliate of Conti ransomware leaked the implementation guide provided by the operators, revealing the step-by-step tools and techniques that attackers could use to deploy the ransomware.

Once they have the malware they need, RaaS affiliates and other ransomware operators can turn to Initial Access Brokers and malware delivery platforms to find and target potential victims. This is fuelling the second big trend anticipated by Sophos.

2. Established cyberthreats will continue to adapt to distribute and deliver ransomware. These include loaders, droppers and other commodity malware; increasingly advanced, human-operated Initial Access Brokers; spam; and adware. In 2021, Sophos reported on Gootloader operating novel hybrid attacks that combined mass campaigns with careful filtering to pinpoint targets for specific malware bundles.

3. The use of multiple forms of extortion by ransomware attackers to pressure victims into paying the ransom is expected to continue and increase in range and intensity. In 2021, Sophos incident responders catalogued 10 different types of pressure tactics, from data theft and exposure, to threatening phone calls, distributed denial of service (DDoS) attacks, and more.

4. Cryptocurrency will continue to fuel cybercrimes such as ransomware and malicious cryptomining, and Sophos expects the trend will continue until global cryptocurrencies are better regulated. During 2021, Sophos researchers uncovered cryptominers such as Lemon Duck and the less common, MrbMiner, taking advantage of the access provided by newly reported vulnerabilities and targets already breached by ransomware operators to install cryptominers on computers and servers.

“Ransomware thrives because of its ability to adapt and innovate,” says Chester Wisniewski, principal research scientist at Sophos.

“For instance, while RaaS offerings are not new, in previous years their main contribution was to bring ransomware within the reach of lower-skilled or less well-funded attackers. This has changed and, in 2021, RaaS developers are investing their time and energy in creating sophisticated code and determining how best to extract the largest payments from victims, insurance companies, and negotiators. They’re now offloading to others the tasks of finding victims, installing and executing the malware, and laundering the pilfered cryptocurrencies. This is distorting the cyberthreat landscape, and common threats, such as loaders, droppers, and Initial Access Brokers that were around and causing disruption well before the ascendancy of ransomware, are being sucked into the seemingly all-consuming ‘black hole’ that is ransomware.

“It is no longer enough for organisations to assume they’re safe by simply monitoring security tools and ensuring they are detecting malicious code. Certain combinations of detections or even warnings are the modern equivalent of a burglar breaking a flower vase while climbing in through the back window. Defenders must investigate alerts, even ones which in the past may have been insignificant, as these common intrusions have blossomed into the foothold necessary to take control of entire networks.”

Additional trends Sophos analysed include:

  • After the ProxyLogon and ProxyShell vulnerabilities were discovered (and patched) in 2021, the speed at which they were seized upon by attackers was such that Sophos expects to see continued attempts to mass-abuse IT administration tools and exploitable internet facing services by both sophisticated attackers and run-of-the-mill cybercriminals
  • Sophos also expects cybercriminals to increase their abuse of adversary simulation tools, such as Cobalt Strike Beacons, mimikatz and PowerSploit. Defenders should check every alert relating to abused legitimate tools or combination of tools, just as they would check a malicious detection, as it could indicate the presence of an intruder in the network
  • In 2021, Sophos researchers detailed a number of new threats targeting Linux systems and expect to see a growing interest in Linux-based systems during 2022, both in the cloud and on web and virtual servers
  • Mobile threats and social engineering scams, including Flubot and Joker, are expected to continue and diversify to target both individuals and organisations
  • The application of artificial intelligence to cybersecurity will continue and accelerate, as powerful machine learning models prove their worth in threat detection and alert prioritisation. At the same time, however, adversaries are expected to make increasing use of AI, progressing over the next few years from AI-enabled disinformation campaigns and spoof social media profiles to watering-hole attack web content, phishing emails and more as advanced deepfake video and voice synthesis technologies become available

By Zaini Majeed for Republic World

In a shocking ‘virtual heist’ at a prestigious jewellery company, Russian hackers on Saturday, October 30 stole details of Hollywood stars and billionaire tycoons including Donald Trump, Oprah Winfrey, Tom Hanks, David Beckham, among many other prominent names.

According to several reports, the hackers conducted an online raid at Graff, a famous jewellery outlet, and one identified cybercriminal based near St. Petersburg compromised the personal information of the world’s most famous and influential people, as well as celebrities including Tom Hanks and Oprah Winfrey, UK’s Mirror reported earlier yesterday.

The criminal raid involves close to 600 Brits that are said to be among the victims. Russian hackers managed to leak as many as 69,000 confidential documents and other information on the dark web as they demanded millions in ransom from the London-based jewellery firm.

Another UK based network Mail reported that members of the Russian hacking gang Conti are suspected of the virtual heist. They are now asking the business to pay tens of millions of pounds in ransom money, supposedly in Bitcoins or jewellery. Of the compromised information, many of the credit notes, invoices and client lists from the business have been leaked.

But the information published on the dark web comprises just about 1% of the total stolen files, says the UK outlet. It quoted a former colonel in British military intelligence, Philip Ingram, as saying, “given the profile of the customer database, this is absolutely massive. This is going to bring the highest levels of international law enforcement down on the gang, and that’s going to give them a whole lot of headaches in trying to get the ransom paid and then get away with it.”

Meanwhile, a spokesman for the Information Commissioner’s Office (ICO), who is capable of imposing penalties of up to 4% of company turnover told Mirror: “We have received a report from Graff Diamonds Ltd regarding a ransomware attack.”

Furthermore, he said, ”We will be contacting the organisation to make further enquiries in relation to the information that has been provided.” The jewellery firm Graff’s spokesperson said: “Regrettably we, in common with a number of other businesses, have recently been the target of a sophisticated – though limited – cyber-attack by professional and determined criminals.”

By Given Majola for IOL

While cybercrime has increased significantly, there are not enough cybersecurity professionals to keep businesses and individuals safe, leaving them in great jeopardy, says Fortinet regional sales manager Doros Hadjizenonos.

He said the shortage of skilled cybersecurity professionals was in the millions globally – affecting up to 82 percent of organisations and possibly tens of thousands in South Africa.

“The Life and Times of Cybersecurity Professionals 2021 report from the Information Systems Security Association and the industry analyst Enterprise Strategy Group shows the cybersecurity skills shortage has not improved and the State of Cybersecurity 2021 reports that 55 percent of survey respondents have unfilled cybersecurity positions.

“At the same time, cyberattacks are soaring. FortiGuard Lab’s midyear Global Threat Landscape Report reveals that ransomware alone has grown over tenfold over the past 12 months,” said Hadjizenonos.

Fortinet, an American multinational corporation that develops and sells cybersecurity solutions, said in the face of a growing cybercrime onslaught, industry leaders, governments and civil society were questioning where the necessary cybersecurity skills would come from to defend organisations against the risks.

Hadjizenonos said in South Africa they believed the answer to the skills shortage lay within the ranks of smart but unemployed youth.

“With up to 44 percent of our labour force without work and as many as 59.5 percent of unemployed people under the age of 35, we have a vast army of potentially tech-savvy people capable of being trained into cyber security positions.

“What’s more, many of these unemployed young people have tertiary qualifications: the graduate unemployment rate is 40.3 percent for those aged 15 to 24 and 15.5 percent among those aged 25 to 34.”

The firm said with the right training and experience, these young people had the potential to bolster a new cyber defence force to support the country’s Fourth Industrial Revolution.

To close the gap, Fortinet said it was committed to closing the cybersecurity skills gap challenge by providing training, certifications and resources through its Training Advancement Agenda initiatives and NSE Training Institute programmes.

Fortinet said it has made all of its self-paced online courses from the Network Security Expert Training Institute available for free, to give all levels of students or information and communications technology practitioners a foundational and advanced understanding of cybersecurity tools and principles.

Since making more than 30 courses available free to anyone worldwide, there have been more than one million registrations for the training courses.

Those interested in transitioning into a career in cybersecurity could also take advantage of Fortinet’s education pathways to enhance their skill sets in specialised areas such as security operations, security-driven networking, adaptive cloud security and zero trust access.

Meanwhile, the Security Academy Programme enables educational institutions around the world to help learners become part of an elite group of skilled cybersecurity professionals.

There are now 420 authorised security academies in 85 countries and territories around the world, including five in South Africa.

Fortinet said it had bolstered its commitment to address the cybersecurity skills gap by pledging to train one million people globally across the next five years through its various training programmes and corporate social responsibility efforts.

 

School robbed of laptops, groceries

By Molaole Montsho for IOL

Four men were arrested for allegedly stealing 18 laptops, a projector and groceries valued at R78 000 from a school in Bloemfontein on Tuesday.

Free State police spokesperson Brigadier Motantsi Makhele said the men, aged between 17 and 25, were arrested on Tuesday morning after police acted on an intelligence-driven operation around Ipopeng and Freedom Square.

“A principal from the local school in Olive Hill, Navalsig, received an alarm notification from school. Upon arrival at about 08.30, he realised that a window to the storeroom was broken. He discovered that 18 HP laptops, school feeding scheme groceries and a projector, all valued at R78 000, were stolen. A case of burglary was opened for investigation,” Makhele said.

The first suspect was apprehended in Ipopeng, where one laptop was recovered. Information led police to Freedom Square where 11 more laptops were recovered and three suspects arrested, Makhele said.

“Upon further investigation, police recovered three more laptops that were already sold to a second-hand goods dealer in town. Investigations are under way to recover the remaining laptops.”

The four are expected to appear in the Bloemfontein Magistrate’s Court soon facing charges of business burglary and the possession of suspected stolen property.

Free State provincial commissioner Lieutenant-General Baile Motswenyane advised residents to refrain from buying suspected stolen goods as they would also be charged. She encouraged second-hand goods dealers to request proof of ownership when they bought second-hand goods.

In the Eastern Cape, two men were arrested on Tuesday in connection with a house robbery in Gelvandale, police said.

Spokesperson Captain Sandra Janse van Rensburg said a woman was woken by a noise at 1am to find three men in her bedroom.

The suspects fled with a television set and her cellphone.

The woman woke up the other occupants in the house and, while they were waiting for the police to arrive, the suspects returned. As the police arrived on the scene, they were informed that the the suspects had returned and a description of the suspects was provided to them.

The police received information that the men were hiding in a house in Gelvandale.

Two suspects were arrested and the stolen television set recovered.

The suspects, aged 19 and 20, were arrested on charges of house robbery and will appear in the Gelvandale Magistrate’s Court during the week.

 

The entirety of Twitch has been leaked

By Chris Scullion for Video Game Chronicles 

An anonymous hacker claims to have leaked the entirety of Twitch, including its source code and user payout information.

The user posted a 125GB torrent link to 4chan on Wednesday, stating that the leak was intended to “foster more disruption and competition in the online video streaming space” because “their community is a disgusting toxic cesspool”.

VGC can verify that the files mentioned on 4chan are publicly available to download as described by the anonymous hacker.

One anonymous company source told VGC that the leaked data is legitimate, including the source code for the Amazon-owned streaming platform.

Internally, Twitch is aware of the breach, the source said, and it’s believed that the data was obtained as recently as Monday.

Twitch has confirmed the leak is authentic: “We can confirm a breach has taken place. Our teams are working with urgency to understand the extent of this. We will update the community as soon as additional information is available. Thank you for bearing with us.”

The leaked Twitch data reportedly includes:

  • The entirety of Twitch’s source code with comment history “going back to its early beginnings”
  • Creator payout reports from 2019
  • Mobile, desktop and console Twitch clients
  • Proprietary SDKs and internal AWS services used by Twitch
  • “Every other property that Twitch owns” including IGDB and CurseForge
  • An unreleased Steam competitor, codenamed Vapor, from Amazon Game Studios
  • Twitch internal ‘red teaming’ tools (designed to improve security by having staff pretend to be hackers)

Some Twitter users have started making their way through the 125GB of information that has leaked, with one claiming that the torrent also includes encrypted passwords, and recommending that users enable two-factor authentication to be safe.

If you have a Twitch account, it’s recommended that you also turn on two-factor authentication, which ensures that even if your password is compromised, you still need your phone to prove your identity using either SMS or an authenticator app.

To turn on two-factor identification:

  • Log on to Twitch, click your avatar and choose Settings
  • Go to Security and Privacy, then scroll down to the Security setting
  • Choose Edit Two-Factor Authentication to see if it’s already activated. If not, follow the instructions to turn it on (you’ll need your phone)

The torrent also reportedly includes Unity code for a game called Vapeworld, which appears to be chat software based on Amazon’s unreleased Steam competitor Vapor.

Meanwhile, Vapor, the codename for an alleged in-development Steam competitor, is claimed to integrate many of Twitch’s features into a bespoke game store.

Finally, the leaked documents allegedly show that popular streamers such as Shroud, Nickmercs and DrLupo have earned millions from working with the popular streaming platform.

What it doesn’t include is money that streamers have earned outside of Twitch, including merchandise, YouTube revenue, sponsorships and external donations.

The anonymous leaker has stated that this is just the first part of the content due to be leaked, but hasn’t stated what they plan to also release.

One cyber security expert said on Wednesday that, if fully confirmed, the Twitch hack “will be the biggest leak I have ever seen”.

Twitch has regularly found itself under fire from creators and users who feel the site doesn’t take enough action against problematic members of the Twitch community.

Last month a group of Twitch streamers called on other channels and viewers to boycott the site for 24 hours as a response to hate raids.

On the same day as the campaign was initially announced, Twitch posted a thread on Twitter explaining that it was attempting to stop hate raids but that it was not “a simple fix”.

“No one should have to experience malicious and hateful attacks based on who they are or what they stand for,” it stated. “This is not the community we want on Twitch, and we want you to know we are working hard to make Twitch a safer place for creators.

“Hate spam attacks are the result of highly motivated bad actors, and do not have a simple fix. Your reports have helped us take action – we’ve been continually updating our sitewide banned word filters to help prevent variations on hateful slurs, and removing bots when identified.

“We’ve been building channel-level ban evasion detection and account improvements to combat this malicious behaviour for months. However, as we work on solutions, bad actors work in parallel to find ways around them – which is why we can’t always share details.”

 

Department of Justice hacked

By Jan Vermeulen for MyBroadband

At least 1 200 files were exfiltrated from Department of Justice computer systems before attackers infected them with ransomware and brought South Africa’s legal system to its knees.

This is according to a notice published by the Information Regulator of South Africa to inform its users of the breach.

It said that according to the Department of Justice and Constitutional Development (DoJ&CD), these files may have contained personal information such as addresses and bank account details.

Personally identifying information of South Africa’s information officers may also have been exposed.

The Information Regulator said that the following personal information might have been exposed:

  • Names, addresses, identity numbers, and phone numbers of information officers
  • Names, residential addresses, identity numbers, phone numbers, qualifications, bank accounts, and salaries of employees
  • Names, addresses, and bank details of the service providers.

The Regulator noted that this is just an early indication of the type of personal data that might have been compromised.

“The DoJ&CD has indicated in its report to the Regulator that at this stage, the investigations are inconclusive in terms of the exact nature of the information that was sent outside the ICT systems of the DoJ&CD,” it stated.

“Therefore, the types of personal information of its data subjects that may have been compromised is not yet determined.”

In addition to details of the data breach, the Information Regulator also revealed that it only found out about the attack because of a media statement issued by the DoJ.

“The Regulator became aware of the possible security compromise through a media statement on 9 September 2021 and was officially notified on 13 September 2021,” it stated.

It was only formally notified after reminding the department of its obligation to notify the Regulator and data subjects per section 22 of the Protection of Personal Information Act (POPIA).

The Information Regulator explained that the attack on the DOJ&CD places it in a curious position.

When the Information Regulator was established, as an interim measure, its computer systems were set up under the structures of the Department of Justice.

This makes the Information Regulator a “data subject” of the department and a “responsible party” that must notify its own data subjects in terms of POPIA.

The DoJ&CD was hit by a ransomware attack on 6 September, knocking several critical systems offline. These included:

  • E-mail
  • Bail services
  • Payment of child maintenance
  • No way to correspond with magistrates or judges — no one can file court papers
  • Recording and transcription of court proceedings offline
  • Master’s offices

Several cases in South Africa’s lower courts were postponed due to the outage, and the court system remains disrupted as the DoJ&CD works to restore its IT systems.

On 17 September, the department said it had recovered some functionality of its system for child maintenance payments, MojaPay.

The Master’s Offices around South Africa have been forced to revert to manual systems, also causing severe disruptions with the following services impacted:

Deceased estates — including issuing letters of executorship and urgent payments out of frozen bank accounts
Curatorships
Orphans whose affairs are being managed by the state
Democratic Alliance MP and former prosecutor Glynnis Breytenbach has said that the disruption to the Master’s Offices is a significant concern.

“They are no longer geared to operate manually. They don’t have the staff,” she stated.

“We need to get these systems back up and running. The Master’s office is so dysfunctional this is going to be the last straw,” she said.

Example of ransomware note without specific amount demanded, pointing victim to a dark web chat service.
The Information Regulator said it currently does not know the person’s identity that broke into the DoJ&CD’s systems. An investigation is underway.

In correspondence received from the DoJ&CD dated 20 September 2021, the Regulator was informed that the issue was detected within the Citrix environment — where applications are hosted.

Connectivity was lost between application and database servers on the evening of 05 September 2021, and, as a result, all user accounts on the Active Directory were locked.

The analysis of the attack concluded that it was a malware infection suspected to be ransomware.

The DoJ&CD informed the Regulator that even though the person’s identity that breached their systems is unknown, the investigation has led to the discovery of text files consistent with ransomware.

These files contain instructions to the department to contact what seems to be the perpetrators.

However, the DoJ&CD has advised that no demand for money has been made as of 20 September 2021.

A source has told MyBroadband that the claim from the DoJ that they didn’t receive a ransom amount is incorrect and that the attackers have asked for 50 bitcoin — around R33 million.

The DoJ&CD has disputed this and maintained that it has received no ransom demand.

 

Follow us on social media: 

               

View our magazine archives: 

                       


My Office News Ⓒ 2017 - Designed by A Collective


SUBSCRIBE TO OUR NEWSLETTER
Top