Connect with us

InfoTech

Kaspersky Cautions Sub-Sahara Africa Banks on Cyber Threats

Published

on

Share

By Mathew Dadiya, Abuja

Jasper sky, a multinational cyber security and antivirus expert – Kaspersky has given a warning to banks in Sub Sahara Africa about imminent cyber threats and loss of finances by a silent hacking group.

According to APO Group on behalf of Kaspersky media contact Mbali Fikeni, the malware used in the attacks indicates that the threat actors are most likely to be an infamous “Silence hacking group”.

The attacks detected, began in the first week of January 2020 and noting that the threat actors were about to begin the final stage of their operation and cash out the funds. To the date, the attacks are ongoing and persist in targeting large banks in several SSA countries.

“We urge all banks to stay vigilant, as apart from the large sums Silence group also steal sensitive information while monitoring the Banks activity as they video record screen activity. This is a serious privacy abuse that might cost more than money can buy.”

Kaspersky security researchers have reported on thousands of notifications of attacks on major banks located in the sub-Saharan Africa (SSA) region.

The Silence group is one of the most active Advanced Persistent Threat (APT) actors, which has carried out a number of successful campaigns targeting banks and financial organisations around the globe.

Kaspersky researchers attribute the attacks to the Russian speaking Silence group based on the malware used in the attacks, which was previously used solely in the group’s operations. In addition, the language of the malware is Russian: threat actors attempted to slightly cover this fact by typing Russian words using the English keyboard layout.

“The typical scenario of the attack begins with a social engineering scheme, as attackers send a phishing e-mail that contains malware to a bank employee. From there the malware gets inside the banks’ security perimeter and lays low for a while, gathering information on the victim organisation by capturing screenshots and making video recordings of the day to day activity on the infected device, learning how things work in the targeted banks. Once attackers are ready to take action, they activate all capabilities of the malware and cash out using, for example, ATMs. The score sometimes reaches millions of dollars.

“Silence group has been quite productive in the past years, as they live up to their name; their operations require an extensive period of silent monitoring, with rapid and coordinated thefts.

We noticed a growing interest of this actor group in banking organisations in 2017 and since that time the group would constantly develop, expanding to new regions and updating their social engineering scheme,” said Sergey Golovanov, security researcher at Kaspersky.

Kaspersky detects the malware used in the operation as HEUR: Trojan.Win32.Generic,PDM:Exploit.Win32.Generic

The cyber experts advised financial institutions to apply the following measures: Introduce basic security awareness training for all employees so that they can better distinguish phishing attempts; Monitor activity in enterprise information systems information security operations center; Use security solutions with dedicated functionality aimed at detecting and blocking phishing attempts. Businesses can protect their on-premise email systems with targeted applications.

Other measures included provision of security teams with access to up to date threat intelligence data, to keep pace with the latest tactics and tools used by cybercriminals; as well as prepare an incident response plan to be ready for potential incidents in the network environment.

Economy

NCC, CBN Approve Refund Framework for Failed Airtime and Data Transactions

Published

on

Share

By David Torough, Abuja

In line with the consumer-focused objectives of the Nigerian Communications Commission (NCC) and the Central Bank of Nigeria (CBN), the two regulators have drawn up a framework to address consumer complaints arising from unsuccessful airtime and data transactions during network downtimes, system glitches, or human input errors.

The framework is the outcome of several months of engagements involving the NCC, the CBN, Mobile Network Operators (MNOs), Value Added Service (VAS) providers, Deposit Money Banks (DMBs), and other relevant stakeholders.

According to the NCC, these engagements were prompted by a rising incidence of failed airtime and data purchases, where subscribers were debited without receiving value and experienced delays in resolution.

“The Framework represents a unified position by both the telecommunications and financial sectors on addressing such complaints. It identifies and tackles the root causes of failed airtime and data transactions, including instances where bank accounts are debited without successful delivery of services. It also prescribes an enforceable Service Level Agreement (SLA) for MNOs and DMBs, clearly outlining the roles and responsibilities of each stakeholder in the transaction and resolution process,”  a statement by Head of Public Affairs of NCC, Nnen Ukoha said.

Under the new framework, where a purchaser is debited but fails to receive value for airtime or data—whether the failure occurs at the bank level or with an NCC licensee—the purchaser is entitled to a refund within 30 seconds, except in circumstances where the transaction remains pending, of which the refund can take up to 24 hours.

The framework further mandates operators to notify consumers via SMS of the success or failure of every transaction. It also addresses erroneous recharges to ported lines, incorrect airtime or data purchases, and instances where transactions are made to the wrong phone number.

  Director of Consumer Affairs at the NCC, Mrs. Freda Bruce-Bennett in a comment on the development said   the framework also establishes a Central Monitoring Dashboard to be jointly hosted by the NCC and the CBN. According to her, the dashboard will enable both regulators to monitor failures, the responsible party, refunds, and track SLA breaches in real time.

“Failed top-ups rank among the top three consumer complaints, and in line with our commitment to addressing these priority issues, we were determined to resolve it within the shortest possible time,” she said.

“We are grateful to all stakeholders—particularly the Central Bank of Nigeria and its leadership—for their tireless commitment to resolving this issue and arriving at this framework, and for ensuring that consumers of telecommunications services receive full value for their purchases.

“So far, pending the approval of management of both regulators on the framework, MNOs and banks have collectively made refunds of over N10 billion to customers for failed transactions” she explained .

Mrs. Bruce-Bennett further noted that implementation of the framework is expected to commence on March 1, 2026, once the two regulators have made final approvals, and technical integration by all MNOs, VAS providers and DMBs is concluded.

Continue Reading

InfoTech

FIFA Hides More than 10 million Hate Posts, Comments

Published

on

International Federation of Association Football (Fédération Internationale de Football Association)
Share

 Football’s ruling body FIFA on Thursday said that it has hidden more than 10 million abusive comments in its fight against hate speech.

FIFA said it has analysed some 33 million posts and comments on 15,302 accounts since it launched its Social Media Protection Service (SMPS) at the 2022 World Cup, and made it available to all its members and players in 2024.

It said that SMPS has been used at 23 tournaments as well as in qualifying and friendly matches.

It is also available at the current Club World Cup for the 32 teams and 2,019 accounts of players, coaches and officials.

FIFA said it is using Artificial Intelligence (AI) to filter abusive posts and hide them from the account owners.

A FIFA survey has revealed that women’s players are more subjected to abuse than the men. (dpa/NAN)

Continue Reading

InfoTech

Cloud Security and its Role in Healthcare Cybersecurity

Published

on

Share

By Engineer Olusola Omotunde

The advent of cloud technology can be traced back to the 1960s according to https://www.cloudzero.com/blog/history-of-the-cloud/.

Cloud technology has evolved from a myth to a revolution in the global space.

In fact, it forms one of the best ways to secure data and save organizational funds.

A drift from the era of physical data centers has become the norm.

Cloud platforms like Amazon and Azure have taken over the scene even in developing climes. How much space does an organization need for its operations and what is the cost effect?

Another pertinent point would be, the security of organizational data.

In this paper, we will provide a synopsis of cloud security and its role in healthcare cybersecurity.

The healthcare industry is one of the most critical aspects of any nation. How safe are patient’s data? What are the mitigating factors? How regularly does the IT team carry out an assessment of the security in place? In all of these, cloud security comes into play.

Cloud security is critical in healthcare cybersecurity because it provides the tools, processes, and policies required to protect sensitive patient data and assure regulatory compliance in an increasingly digital environment. Healthcare organizations that use cloud services for electronic health records (EHRs), telemedicine, patient portals, and other services face specific cybersecurity challenges, such as protecting huge amounts of personally identifiable information (PII) and protected health information (PHI).

Below are some aspects where cloud security contributes or plays pivotal roles in healthcare cybersecurity:

1. Data Protection

• Data Backup and Recovery: Cloud solutions provide backup and disaster recovery capabilities, which assist healthcare organizations in protecting data from loss due to cyberattacks or system failures.

• Encryption: Cloud providers provide sophisticated encryption options for data at rest and in transit. This is critical for healthcare providers to safeguard sensitive patient information from unauthorized access.

2. Prevention and Detection of Threat

• Real-time Monitoring and Alerts: Cloud security solutions can provide 24-hour monitoring and notifications if suspicious behaviour is discovered. This quick response capability is crucial for healthcare organizations to avoid or mitigate the effects of cyber events.

• Advanced Threat Protection: Cloud providers provide services that include threat detection features like intrusion detection, malware scanning, and vulnerability assessments. These services assist healthcare organizations in identifying and addressing hazards before they cause harm.

• Automated Patch Management: Cloud providers frequently handle patch management for their infrastructure, ensuring that systems are up to date against the most recent vulnerabilities, which can dramatically minimize the risk of attack.

  3.  Flexibility and Scalability

• Scalable Security: As healthcare organizations expand, cloud security can scale with them, allowing for the installation of additional security measures without requiring major infrastructure upgrades.

• Adaptable Infrastructure: Healthcare organizations can quickly respond to emerging threats with cloud-based solutions that include updated security tools and services. This adaptability is critical in a dynamic threat context.

4. Cost Efficiency

• Pay-as-you-go Model: Many cloud services use a pay-as-you-go model, which allows healthcare providers to only pay for the security services they use. This can help organizations manage costs while still providing high-quality security tools.

• Reduced IT Costs: Cloud providers manage and maintain the infrastructure, eliminating the need for healthcare companies to invest heavily in on-premises security hardware and personnel.

5. Regulatory Compliance

• HIPAA and GDPR Compliance: Cloud providers that service healthcare organizations frequently offer solutions designed to comply with industry-specific standards such as the Health Insurance Portability and Accountability Act (HIPAA) in the United States and the General Data Protection Regulation (GDPR) in Europe.

• Audit Support: Many cloud services provide logging and monitoring capabilities to assist healthcare organizations in tracking and auditing data access and usage, which is critical for regulatory compliance.

Key Considerations for Healthcare Providers across the globe

When healthcare providers deploy cloud solutions, they must address a number of security concerns to safeguard sensitive patient data, ensure regulatory compliance, and manage possible risks. It is also important that they scrutinize the security certificates held by cloud providers, ensure that they clarify ownership rights to their data with their cloud providers, training staff on the security best practices which include training on data handling, phishing awareness and secure access protocol.

There is no one-size fits all rule other than being careful!

Engineer Olusola Omotunde is an IT expert and writes from Lagos, Nigeria


Continue Reading

Advertisement

Read Our ePaper

Top Stories

SPORTS4 hours ago

WAFCON 2026: Super Falcons to Know Group Foes Today

ShareHolders Nigeria’s Super Falcons will discover their group opponents at the 2026 Women’s Africa Cup of Nations on Thursday. The...

DEFENCE5 hours ago

Nigerian Army Begins Construction of New Training Depot in Ebonyi

ShareBy David Torough, Abuja The Nigerian Army has commenced the construction of an additional training depot at Amasiri-Edda in Afikpo...

NEWS5 hours ago

NiMet Inaugurates AI Team to Advance Weather Forecasts

ShareThe Nigerian Meteorological Agency (NiMet) has inaugurated an Artificial Intelligent (AI) research and integration team to advance weather forecasting innovation....

NEWS5 hours ago

Gunmen Kill PDP House of Assembly Candidate, Four Others in Benue

ShareFrom Attah Ede, Makurdi Suspected armed herders have killed five persons, including the house of assembly candidate for Otukpo-Akpa state...

DEFENCE8 hours ago

NAF Invites Youths for Tech-driven Airpower Innovation through CAS Literary Competition

ShareThe Nigerian Air Force (NAF) has called on Nigerian youths to channel their creativity and intellect toward shaping the future...

NEWS10 hours ago

Police Confirms Slaughter Homes in Benue, Apprehends 41 Suspects

ShareFrom Attah Ede, Makurdi Policemen in Benue State have arrested 41 suspects in connection with the alleged slaughter homes operating...

NEWS11 hours ago

Tinubu Visits, Opens New Trade Front with UAE

ShareBy David Torough, Abuja President Bola Tinubu yesterday signed a landmark Comprehensive Economic Partnership Agreement (CEPA) with the United Arab...

DEFENCE11 hours ago

FG Honors Army Chief, Officer, Veterans at 2026 Armed Forces Remembrance Gala

ShareBy David Torough, Abuja The Federal Government on Tuesday honoured serving personnel and veterans of the Nigerian Army for gallantry,...

NEWS1 day ago

The Knee on EFCC’s Neck

ShareBy Reuben Abati “The knee on his neck” reminds us of the case of the American citizen, George Floyd, who...

Foreign News1 day ago

Over Hundred Children killed in Gaza since Ceasefire, Says UNICEF

ShareThe U.N. children’s agency on yesterday said over 100 children have been killed in Gaza since the October ceasefire, including...