All Article Properties:
{
"access_control": false,
"status": "publish",
"objectType": "Article",
"id": "859170",
"signature": "Article:859170",
"url": "https://staging.dailymaverick.co.za/article/2021-03-09-sa-ripe-for-the-picking-for-political-critical-infrastructure-cyber-attacks/",
"shorturl": "https://staging.dailymaverick.co.za/article/859170",
"slug": "sa-ripe-for-the-picking-for-political-critical-infrastructure-cyber-attacks",
"contentType": {
"id": "1",
"name": "Article",
"slug": "article"
},
"views": 0,
"comments": 0,
"preview_limit": null,
"excludedFromGoogleSearchEngine": 0,
"title": "SA ripe for the picking for political, critical infrastructure cyber-attacks",
"firstPublished": "2021-03-09 14:43:13",
"lastUpdate": "2021-03-09 14:43:13",
"categories": [
{
"id": "29",
"name": "South Africa",
"signature": "Category:29",
"slug": "south-africa",
"typeId": {
"typeId": "1",
"name": "Daily Maverick",
"slug": "",
"includeInIssue": "0",
"shortened_domain": "",
"stylesheetClass": "",
"domain": "staging.dailymaverick.co.za",
"articleUrlPrefix": "",
"access_groups": "[]",
"locale": "",
"preview_limit": null
},
"parentId": null,
"parent": [],
"image": "",
"cover": "",
"logo": "",
"paid": "0",
"objectType": "Category",
"url": "https://staging.dailymaverick.co.za/category/south-africa/",
"cssCode": "",
"template": "default",
"tagline": "",
"link_param": null,
"description": "Daily Maverick is an independent online news publication and weekly print newspaper in South Africa.\r\n\r\nIt is known for breaking some of the defining stories of South Africa in the past decade, including the Marikana Massacre, in which the South African Police Service killed 34 miners in August 2012.\r\n\r\nIt also investigated the Gupta Leaks, which won the 2019 Global Shining Light Award.\r\n\r\nThat investigation was credited with exposing the Indian-born Gupta family and former President Jacob Zuma for their role in the systemic political corruption referred to as state capture.\r\n\r\nIn 2018, co-founder and editor-in-chief Branislav ‘Branko’ Brkic was awarded the country’s prestigious Nat Nakasa Award, recognised for initiating the investigative collaboration after receiving the hard drive that included the email tranche.\r\n\r\nIn 2021, co-founder and CEO Styli Charalambous also received the award.\r\n\r\nDaily Maverick covers the latest political and news developments in South Africa with breaking news updates, analysis, opinions and more.",
"metaDescription": "",
"order": "0",
"pageId": null,
"articlesCount": null,
"allowComments": "1",
"accessType": "freecount",
"status": "1",
"children": [],
"cached": true
}
],
"content_length": 6772,
"contents": "<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weight: 400;\">Cybercriminals </span><a href=\"https://www.google.com/search?client=safari&rls=en&q=How+Hackers+Tried+to+Add+Dangerous+Lye+into+a+City%27s+Water+Supply+-+Scientific+American&ie=UTF-8&oe=UTF-8\"><span style=\"font-weight: 400;\">infiltrated</span></a><span style=\"font-weight: 400;\"> a water treatment plant in Florida, United States, last month, trying to alter the chemical composition of the water supply. The real-world consequences of such a cyber attack are frightening. With increased digitisation of critical infrastructure and the ability for those with malicious intent to gain remote access to a plant’s computers, a picture of dystopian proportions emerges. </span>\r\n\r\n<span style=\"font-weight: 400;\">For developing economies such as South Africa, the knock-on effect from cyber attacks on critical infrastructure is potentially devastating. Imagine cybercriminals disrupting the logistics network for food, energy or vital medical supply chains.</span>\r\n\r\n<span style=\"font-weight: 400;\">Cybersecurity is largely absent from the South African Cybercrimes </span><a href=\"https://static.pmg.org.za/parl-bills-B6D-2017-GJ_B6D-2017-GJ.PDF\"><span style=\"font-weight: 400;\">Bill</span></a><span style=\"font-weight: 400;\">, which is waiting to be signed into law. Concerns about government overreach have driven the argument favouring a separate future bill on cybersecurity. Until such time, </span><a href=\"https://www.engineeringnews.co.za/article/sa-urged-to-pursue-cybersecurity-frameworks-based-on-global-best-practice-2020-11-20-1/rep_id:4136\"><span style=\"font-weight: 400;\">technology</span></a><span style=\"font-weight: 400;\"> experts warn, best practices should be adopted to secure operational technology and protect basic utilities such as water and electricity. </span>\r\n\r\n<span style=\"font-weight: 400;\">One of the biggest problems is the speed at which cyber threats are evolving. Many South African businesses have experienced denial-of-service and ransomware attacks where databases are encrypted by criminals who demand payment to release a ‘key’ to restore access. </span>\r\n\r\n<span style=\"font-weight: 400;\">The rapid roll-out of the internet of things (IoT)-based technologies has potentially increased the ‘threat surface’ in which cybercriminals operate. Medical, financial, manufacturing and extractive industries are among South Africa’s sectors increasingly applying IoT processes. So are IoT devices easier to hack? </span>\r\n\r\n<span style=\"font-weight: 400;\">Tiaan van Schalkwyk from Deloitte South Africa’s cyber risk team says, “They are not secure by default. The security needs to be configured before they are deployed.” Worldwide, this hasn’t always happened. In Europe, he says, in the early days of smart meters, devices were rolled out initially without such security configuration – making them vulnerable to manipulation. </span>\r\n\r\n<span style=\"font-weight: 400;\">South Africa’s critical infrastructure has </span><a href=\"http://www.scielo.org.za/scielo.php?script=sci_arttext&pid=S2077-72132017000100006\"><span style=\"font-weight: 400;\">experienced</span></a><span style=\"font-weight: 400;\"> cyber attacks, although the impact has been limited. An attack on Johannesburg’s municipal electricity system for example largely affected </span><a href=\"https://www.iol.co.za/the-star/news/city-of-joburg-hacking-how-it-happened-35889367\"><span style=\"font-weight: 400;\">billing</span></a><span style=\"font-weight: 400;\"> rather than other technical operations. </span>\r\n\r\n<span style=\"font-weight: 400;\">What is defined as critical infrastructure is contained in the Critical Infrastructure Protection </span><a href=\"https://www.gov.za/documents/critical-infrastructure-protection-act-8-2019-english-isixhosa-28-nov-2019-0000?gclid=EAIaIQobChMIz6vGxvSe7wIVE-vtCh375wkiEAAYASAAEgIQ9_D_BwE\"><span style=\"font-weight: 400;\">Act</span></a><span style=\"font-weight: 400;\"> 2019. It includes infrastructure “essential for the economy” and relating to “security, public safety and the continuous provision of basic public services.” By and large, the country has robust protocols for dealing with intrusions in critical infrastructure. This includes a system of Computer Security Incident Response Teams for identifying, responding to and mitigating risks, across different sectors of the economy. </span>\r\n\r\n<span style=\"font-weight: 400;\">“Where we have more vulnerability is in electricity,” says Eric McGee from Deloitte South Africa’s cyber risk team. “We have a single entity which is Eskom. The dependency is significant and so the risk of impact is high. It is dominated by a single player which makes it vulnerable. There is a similar risk for telecoms infrastructure because it is underpinned by a single player – i.e. Telkom (although this has improved somewhat over time).”</span>\r\n\r\n<span style=\"font-weight: 400;\">In practice, this means a single point of failure can have far-reaching consequences, as was the case with the December 2015 attack on Ukraine’s power grid, attributed to </span><a href=\"https://jsis.washington.edu/news/cyberattack-critical-infrastructure-russia-ukrainian-power-grid-attacks/\"><span style=\"font-weight: 400;\">Russia</span></a><span style=\"font-weight: 400;\">.</span>\r\n\r\n<span style=\"font-weight: 400;\">South Africa’s financial institutions have also been the target of cyberattacks, including the Anonymous cyber campaign that </span><a href=\"https://www.rferl.org/a/explainer_what_is_anonymous_and_how_does_it_operate/24500381.html\"><span style=\"font-weight: 400;\">peaked</span></a><span style=\"font-weight: 400;\"> between 2013 and 2016. More recently the </span><a href=\"https://www.reuters.com/article/us-cyber-solarwinds-microsoft-idUSKBN2AF03R\"><span style=\"font-weight: 400;\">SolarWinds</span></a><span style=\"font-weight: 400;\"> attack on Microsoft in the US demonstrated how emails and other sensitive material from various US government agencies were compromised. </span>\r\n\r\n<span style=\"font-weight: 400;\">Although South Africa may consider itself an unlikely target for state-to-state attacks, the threat of being collateral damage is real. So too is the danger posed by hacktivists – cyber activists – or lone individuals with criminal intent.</span>\r\n\r\n<span style=\"font-weight: 400;\">Given this risk exposure, South Africa should learn from best practices elsewhere. For instance, the US National Institute of Standards and Technology publishes a blueprint to protect against cyberattacks that may offer guidance in a rapidly evolving cyber-dependent environment.</span>\r\n\r\n<span style=\"font-weight: 400;\">The South African Banking Risk Information Centre (SABRIC) already shares best practices and reports of intrusions among its members to mitigate the risk of data being stolen, access denied or processes being meddled with. Similar bodies are expected to be developed for the cellphone industry.</span>\r\n\r\n<span style=\"font-weight: 400;\">As well as physical infrastructure, there are vulnerabilities in information infrastructure, South African government experts told the Institute for Security Studies. Banks are part of the country’s critical information infrastructure, as are government-held databases and communications infrastructure, including cellphone networks. </span>\r\n\r\n<span style=\"font-weight: 400;\">Malicious actors could grind a country to a halt by capturing its banking sector or cellphone network, and inflict as much damage as they would by capturing the national grid. Although systems such as centralised biometric databases to verify, for example, a person’s identity is held by the public sector in South Africa, much critical information infrastructure resides in the private sector. </span>\r\n\r\n<span style=\"font-weight: 400;\">Here there are deep concerns about government and the State Security Agency in particular meddling in cybersecurity matters. Hesitant to give the state the monopoly to secure critical information infrastructure, banks and other financial institutions are seeking to develop cyber resilience by sharing best practice through this SABRIC model of collective security. </span>\r\n\r\n<span style=\"font-weight: 400;\">Other sectors such as the cellphone industry, CCTV camera networks and healthcare providers could do the same – sharing best practices and adopting codes of conduct, pledging not to exploit competitors’ vulnerabilities. </span>\r\n\r\n<span style=\"font-weight: 400;\">As much a risk to critical infrastructure is the risk of cyber intrusions through mis- or disinformation campaigns. This has implications for law and order, elections and more broadly free speech. </span>\r\n\r\n<span style=\"font-weight: 400;\">Deloitte’s McGee sees this as a greater risk to South Africa than attacks on critical infrastructure. “If we look at China, the ability to influence is as much a threat as attacking infrastructure. In South Africa, our infrastructure has the ability to recover pretty quickly – but influence is harder to respond to.”</span>\r\n\r\n<span style=\"font-weight: 400;\">In the short term though, the most efficient way to address the more tangible threats to critical infrastructure would be to share best practices, adopt codes of practice for threats and exchange information. <strong>DM</strong></span>\r\n\r\n<i><span style=\"font-weight: 400;\">Karen Allen, Senior Research Adviser, Emerging Threats in Africa, ISS Pretoria.</span></i>\r\n\r\n ",
"teaser": "SA ripe for the picking for political, critical infrastructure cyber-attacks",
"externalUrl": "",
"sponsor": null,
"authors": [
{
"id": "23372",
"name": "Karen Allen",
"image": "",
"url": "https://staging.dailymaverick.co.za/author/karen-allen/",
"editorialName": "karen-allen",
"department": "",
"name_latin": ""
}
],
"description": "",
"keywords": [
{
"type": "Keyword",
"data": {
"keywordId": "2741",
"name": "Eskom",
"url": "https://staging.dailymaverick.co.za/keyword/eskom/",
"slug": "eskom",
"description": "Eskom is the primary electricity supplier and generator of power in South Africa. It is a state-owned enterprise that was established in 1923 as the Electricity Supply Commission (ESCOM) and later changed its name to Eskom. The company is responsible for generating, transmitting, and distributing electricity to the entire country, and it is one of the largest electricity utilities in the world, supplying about 90% of the country's electricity needs. It generates roughly 30% of the electricity used\r\nin Africa.\r\n\r\nEskom operates a variety of power stations, including coal-fired, nuclear, hydro, and renewable energy sources, and has a total installed capacity of approximately 46,000 megawatts. The company is also responsible for maintaining the electricity grid infrastructure, which includes power lines and substations that distribute electricity to consumers.\r\n\r\nEskom plays a critical role in the South African economy, providing electricity to households, businesses, and industries, and supporting economic growth and development. However, the company has faced several challenges in recent years, including financial difficulties, aging infrastructure, and operational inefficiencies, which have led to power outages and load shedding in the country.\r\n\r\nDaily Maverick has reported on this extensively, including its recently published investigations from the Eskom Intelligence Files which demonstrated extensive sabotage at the power utility. Intelligence reports obtained by Daily Maverick linked two unnamed senior members of President Cyril Ramaphosa’s Cabinet to four criminal cartels operating inside Eskom. The intelligence links the cartels to the sabotage of Eskom’s power stations and to a programme of political destabilisation which has contributed to the current power crisis.",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Eskom",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "3711",
"name": "Microsoft",
"url": "https://staging.dailymaverick.co.za/keyword/microsoft/",
"slug": "microsoft",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Microsoft",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10244",
"name": "Cybercrime",
"url": "https://staging.dailymaverick.co.za/keyword/cybercrime/",
"slug": "cybercrime",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybercrime",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "10510",
"name": "Anonymous",
"url": "https://staging.dailymaverick.co.za/keyword/anonymous/",
"slug": "anonymous",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Anonymous",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "11014",
"name": "State Security Agency",
"url": "https://staging.dailymaverick.co.za/keyword/state-security-agency/",
"slug": "state-security-agency",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "State Security Agency",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "12511",
"name": "Telkom",
"url": "https://staging.dailymaverick.co.za/keyword/telkom/",
"slug": "telkom",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Telkom",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "61625",
"name": "Hackers",
"url": "https://staging.dailymaverick.co.za/keyword/hackers/",
"slug": "hackers",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Hackers",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "85262",
"name": "Cybersecurity",
"url": "https://staging.dailymaverick.co.za/keyword/cybersecurity/",
"slug": "cybersecurity",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Cybersecurity",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347135",
"name": "digitisation",
"url": "https://staging.dailymaverick.co.za/keyword/digitisation/",
"slug": "digitisation",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "digitisation",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347136",
"name": "Tiaan van Schalkwyk",
"url": "https://staging.dailymaverick.co.za/keyword/tiaan-van-schalkwyk/",
"slug": "tiaan-van-schalkwyk",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "Tiaan van Schalkwyk",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347137",
"name": "cyber risk",
"url": "https://staging.dailymaverick.co.za/keyword/cyber-risk/",
"slug": "cyber-risk",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "cyber risk",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347138",
"name": "the internet of things",
"url": "https://staging.dailymaverick.co.za/keyword/the-internet-of-things/",
"slug": "the-internet-of-things",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "the internet of things",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347139",
"name": "IoT",
"url": "https://staging.dailymaverick.co.za/keyword/iot/",
"slug": "iot",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "IoT",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347140",
"name": "SolarWinds",
"url": "https://staging.dailymaverick.co.za/keyword/solarwinds/",
"slug": "solarwinds",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SolarWinds",
"translations": null
}
},
{
"type": "Keyword",
"data": {
"keywordId": "347141",
"name": "SABRIC",
"url": "https://staging.dailymaverick.co.za/keyword/sabric/",
"slug": "sabric",
"description": "",
"articlesCount": 0,
"replacedWith": null,
"display_name": "SABRIC",
"translations": null
}
}
],
"short_summary": null,
"source": null,
"related": [],
"options": [],
"attachments": [
{
"id": "88852",
"name": "",
"description": "",
"focal": "50% 50%",
"width": 0,
"height": 0,
"url": "https://dmcdn.whitebeard.net/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"transforms": [
{
"x": "200",
"y": "100",
"url": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "450",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "800",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1200",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
},
{
"x": "1600",
"y": "0",
"url": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg"
}
],
"url_thumbnail": "https://dmcdn.whitebeard.net/i/qzxzw_sBdPZuMy9eb4idc0y0LAY=/200x100/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_medium": "https://dmcdn.whitebeard.net/i/MzsirMPKpBMrAmK2h38ebjGY4eM=/450x0/smart/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_large": "https://dmcdn.whitebeard.net/i/nt0crSLDFAX7oMePbpIdPmi3puE=/800x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xl": "https://dmcdn.whitebeard.net/i/SFU4dUK8jf5U_qyoetWqSgbd-04=/1200x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"url_xxl": "https://dmcdn.whitebeard.net/i/32d2kT_9ZnW7hWjtYiwCQhh4l7s=/1600x0/smart/filters:strip_exif()/file/dailymaverick/wp-content/uploads/2019-11-14-iss-today-policing-cybercrime-banner.jpg",
"type": "image"
}
],
"summary": "Having single entities supplying electricity and telecoms is just one reason the country is vulnerable to remote hackers.",
"template_type": null,
"dm_custom_section_label": null,
"elements": [],
"seo": {
"search_title": "SA ripe for the picking for political, critical infrastructure cyber-attacks",
"search_description": "<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weight: 400;",
"social_title": "SA ripe for the picking for political, critical infrastructure cyber-attacks",
"social_description": "<i><span style=\"font-weight: 400;\">First published by </span></i><a href=\"https://issafrica.org/iss-today\"><i><span style=\"font-weight: 400;\">ISS Today</span></i></a>\r\n\r\n<span style=\"font-weight: 400;",
"social_image": ""
},
"cached": true,
"access_allowed": true
}