MTN Group Reports Ransomware Attack: Customer Data Compromised

MTN Group, Africa’s largest telecommunications provider, has experienced a significant cybersecurity breach in April. The incident, which led to unauthorised access to the personal information of customers in more than one market, is the latest in a series of cyber incidents at major companies across the country. 

Despite the breach, MTN confirmed that its core infrastructure, including network, billing, and financial systems, remained secure and fully operational. Here are the full details of the breach and what businesses can learn from MTN’s response. 

How the Breach Happened 

Though MTN is a household name in SA, the  cyberattack actually resulted in the compromise of customer data beyond our borders, with approximately 5 700 MTN Ghana customers being affected. 

An unknown third party claimed responsibility for the breach and demanded a ransom for the release of the stolen data – a classic MO for cyberattacks of this kind. 

At the time of publishing this update MTN had not disclosed the ransom amount, citing the ongoing investigation, and has also neither confirmed nor denied that paying the ransom is a strategy currently under consideration. 

Did MTN Respond Appropriately?

MTN’s reaction in the hours and days following this attack is a good example of proactive cybersecurity response and the benefits of risk mitigation. 

  • After discovering the breach, MTN activated its cybersecurity response protocols and altered law enforcement agencies such as the South African Police Service (SAPS) and the Hawks. 
  • This is the recommended course of action for any business dealing with a major cyber incident. 
  • The company also notified relevant authorities in affected countries and is in the process of informing impacted customers, adhering to local legal and regulatory requirements. As above, this is the approach favoured by cybersecurity experts: placing customer privacy and data first. 

MTN joins a long list of prominent cybersecurity victims across the country 

This incident is not the first of its kind, nor will it be the last, but it once again highlights the growing threat of ransomware attacks in the telecommunications sector. 

Earlier in 2025, Cell C, confirmed a data breach linked to a ransomware attack by the RansomHouse group. Unlike the anonymous MTN incident, this attack was carried out by a notorious cybercrime network with the intention of adding Cell C to their list of high profile victims. 

The ripple effects of cyberattacks have againbextended beyond telecoms to other essential services, including the travel industry. In May, South African Airways (SAA) suffered a major cyber incident that disrupted access to its website, mobile app, and key operational systems. The breach, which began over a weekend, significantly impacted customer services and internal processes, highlighting the broad-reaching consequences of digital vulnerabilities across sectors.

Whether hackers strike stealthily or make a show of their ability to penetrate digital defences, the increasing frequency of attacks like these underscores the need for robust cybersecurity measures across the industry and the economy as a whole. 

Secure your company data with us 

While MTN’s swift response ensured the protection of its core systems, the breach of customer data raises concerns about data privacy and the evolving cyber threats facing telecom and other industry operators. 

This incident serves as a reminder for companies to continuously assess and strengthen their cybersecurity frameworks to safeguard against future attacks.

To protect your business and clients’ critical data you need an integrated approach to cyber protection. Soteria Cloud offers an advanced backup package with secure managed cloud backup paired with Acronis Cyber Protect for the ultimat in data protection.  

To learn more about our packages and how they can keep your files safe and encrypted in the cloud, click the button below. 

Cloud Misconfiguration Pitfalls | Data Breaches

Faulty Cloud Misconfiguration and Other Technical Errors

As the number of cyberattacks affecting South African businesses continues to soar, many IT specialists are coming to the realisation that it’s not only cybercriminals, but also faulty configurations and other technical errors that are to blame for data loss incidents.

It’s not uncommon for these technical errors to come to the fore in the aftermath of a cyberattack when the steps leading up to the incident are analysed. Unfortunately, by then it’s often too late.

Instead, we advocate a proactive approach, whereby companies study the most common configurations that have resulted in data loss at other businesses, and close as many loopholes as possible to avoid a similar fate.

In this article, we highlight some of the most common configuration mistakes that companies make, and how to correct them and pair these efforts with secure cloud storage before an incident occurs.

Unrestricted Ports and Services

Open ports are an open-door invitation for criminals to help themselves to your valuable data. Fortunately, resolving this issue is usually quite simple and provides a huge security boost without a large time or financial investment.

  • Leaving unnecessary ports open can provide attackers with entry points into cloud environments. 
  • Misconfigurations that result in unrestricted access to services can be exploited, leading to unauthorised data access or system compromise.

Excessive Permissions

Setting appropriate permission levels for team members can help prevent your data from falling into the wrong hands—even within the organisation. 

  • Multi-factor authentication ensures that only authorised users are able to access your network. 
  • Taking it a step further by assigning data and knowledge permissions only to those whose title and rank justify it is equally important.

Lack of Encryption

Failing to encrypt data at rest and in transit can expose it to interception and unauthorised access. Implementing robust encryption protocols is essential to protect data integrity and confidentiality.

  • Despite the rise in cyberattacks, a surprisingly large number of companies still do not have proper encryption protocols in place. 
  • This is especially dangerous for data that resides on file systems and user devices but has not yet been backed up in the cloud.

Migrating to a cloud-based storage solution that places virtually all newly created files in the cloud—using the latest data encryption technology—can help close security gaps and ensure that the most recent versions of important files are safe and accessible in the event of a cyberattack.

Consequences of Cloud Misconfigurations

The fallout from cloud misconfigurations can be severe, leading to financial, reputational, and legal damage to your business. Several high-profile cyberattacks have cost businesses millions in recent years.

On the global stage, American telecommunications giant AT&T agreed to pay $13 million to settle an investigation by the Federal Communications Commission (FCC) concerning a data breach that occurred due to a cloud vendor’s misconfiguration.

Closer to home, a report released in late 2024 indicates that companies in South Africa lost in excess of R350 million in the biggest data breaches of recent years. With the likes of

With Experian, Pam Golding estate agency, and several government agencies all having fallen prey to cybercriminals – and the Information Regulator warning that basic cyber safety measures, including security configurations, have not been taken in many cases—the potential risk of misconfigurations can’t be overstated.

The Importance of Regular Security Audits

Conducting regular security audits is vital to identify and rectify misconfigurations before they can be exploited. These audits should include:

  • Configuration Reviews: Frequently assessing cloud configurations to ensure compliance with security best practices, and making this part of company policy, can help detect weaknesses before they escalate.
  • Access Controls Evaluation: It’s essential to verify that access permissions are appropriately assigned, in line with “least privilege” allocations.
  • Vulnerability Scanning: Automated tools that detect vulnerabilities and misconfigurations within the cloud environment can save time and significantly reduce risk.
  • Incident Response Planning: A cybercrime response plan will help ensure that swift action can be taken in the event of a data compromise incident.
  • Secure Cloud Storage: Fully encrypted storage offers the ability to restore compromised data, even in a worst-case scenario.

Add an Essential Layer of Protection to Your Data with Secure Cloud Storage

Tightening your security configuration practices to make your data harder to access is a vital online safety measure — but it must be complemented by secure cloud storage to be truly effective.

Our range of data defence products for businesses of all sizes will help secure your data at a time when hackers are ramping up their criminal actions. Secure your data with us today.

Estate Agency Data Breach – Cloud Backup Solutions

A Credit Bureau, an Estate Agency, and a Web of Cybercrime Intrigue

One of the country’s most prestigious real estate companies obtaining leaked customer information from the Experian data breach reads like a work of fiction. Yet this bizarre possibility is playing out in the media right now, with all parties involved scrambling to limit the damage to their reputations.

Real Estate Agency Pam Golding has been associated with luxury real estate in South Africa for decades, with the company successfully crafting a brand centred around exclusivity and the highest standards. 

However, a recent data incident concerning the company’s contact database is shining an uncomfortable spotlight on this well-known estate agent’s network and its potentially bizarre connection to last year’s Experian data leak.

Did property giant Pam Golding obtain information from a data leak?

One of SA’s best known companies’ handling of sensitive information was publicly brought into question recently when a cybersecurity researcher noticed a strange pattern of data ownership regarding their own email address.

The researcher, who is  extremely careful when it comes to online privacy, used a catch-all email address with various aliases when entering their information online – a practice that’s worth emulating in your own personal and business dealings.

So far, there’s nothing surprising in the story –  until you find out what happened next: the individual discovered that their email address had been compromised after Pam Golding revealed that a large chunk of its database had been subject to unauthorised access earlier this year, apparently due to stolen credentials. 

  • The perplexing aspect of this incident was that the individual had never provided Pam Golding with the alias email address they usually use online.
  • On further inspection, they discovered that the realtor had also sent them a direct marketing email several months prior, once again to the same address that had never been voluntarily provided. However, the same address had been part of the Experian data breach that affected millions of customers across the country. 

The awkward question that arises from all of this is: how did Pam Golding come to possess this email address, and how many other people’s personal information does the company currently hold without their knowledge? 

As cybersecurity experts, we can think of two possible explanations for what happened: 

  1. Pam Golding somehow obtained leaked personal information from the Experian data breach last year, or 
  2. Experian provided them with this information through official – if not legitimate – means.

As a reputable and large business, which is very much a household name across South Africa and even in neighbouring markets like Mauritius, it’s hard to imagine Pam Golding skimming the dark net for opportunities to buy leaked Experian data. 

The far more likely explanation is that Experian has been sharing the personal details of credit customers from its database with third parties for a fee. As such, it’s more plausible that Experian, and not Pam Golding, has serious questions to answer regarding the protection of personal data privacy.

Are credit bureaus doing a side trade in confidential client information?

The allegation that credit bureaus sometimes sell confidential information to other businesses may be disturbing but it’s not new. Dominic White, one of the country’s foremost cybersecurity experts, has been speculating for years that this is the case. 

Without accusing either organisation of wrongdoing, it’s not a far stretch to assume that something of this nature might have happened in a case like this.

Pam Golding declines to comment, citing POPI regulations

The media has reacted with an understandable measure of alarm in the wake of the Pam Golding and Experian accusations, and to date the real estate group has been tight-lipped about the details of the incident. It must be mentioned however, that Pam Golding took immediate steps to contain the breach, acting swiftly to secure their systems and removing all unauthorised access.

In an ironic twist, Pam Golding maintains that they’re unable to comment on any aspect of their clients’ data in order to remain in compliance with the Protection of Personal Information Act. 

This, despite the fact that obtaining sensitive customer information from a third party without the owner’s permission could likely constitute a breach of the Act itself.

Whatever the outcome of this embarrassing incident may be, the lesson for all businesses is clear: consumers are no longer willing to tolerate the mishandling of their personal information, and when companies are suspected of acting irregularly, the incident is likely to become highly publicised and do damage to their reputation.

Protect your data and your business reputation today

If this incident has given you cause for thought as to the best practices to follow in your own business when handling client information, we’d like to support you in creating a comprehensive data security approach that protects not only your information, but that of your clients. 

Our range of secure cloud storage packages, particularly our Total Data Protection offering, can help ensure that all customer information is kept safe and help you comply fully with POPIA. Click the button below to learn more.

SASSA Vulnerabilities Report – Cybercrime

SA Social Security Agency Releases Report on Large-Scale Cybersecurity Breach

The South African Social Security Agency (SASSA) has released an in-depth report following a large-scale breach of its cyber defences last year which is alleged to have cost taxpayers an estimated R175 million. 

The findings raise serious questions about the cybersecurity protocols in place at government departments and suggest several key areas for improvement.

While the cyberattack on SASSA was significant, it was not unique. With organisations of all sizes increasingly falling prey to hackers and cybercriminals, the report offers valuable lessons that every organisation can implement. 

Let’s take a closer look at what happened, what the investigation uncovered, and how businesses can use this information to keep their own data safe.

Large-Scale Cybersecurity Breach Detected by University Students

When hackers breached SASSA’s defences, they helped themselves to an enormous sum of money which was ultimately financed by South African taxpayers. The hacking group N4ughtySecGroup, which claimed responsibility, alleged that the amount stolen exceeds R175 million. 

A troubling revelation for commentators and the public is that the breach wasn’t detected by the department itself. In fact it was first-year computer science students Joel Cedras and Veer Gosai from Stellenbosch University who stumbled upon it while working on a research project.

In the wake of their discovery, SASSA launched an investigation, with cybersecurity specialist Stanly Machote and auditing firm Masegare & Associates tasked with uncovering how such a critical security failure had occurred. 

The report, recently presented to Parliament, outlines the modus operandi of those responsible, though their identities remain classified.

  • The hackers exploited vulnerabilities in the Social Relief of Distress (SRD) grant system, which was introduced during the COVID-19 lockdown as a R350-per-month survival grant. 
  • The government later extended these payments as a form of universal basic income for struggling families. Unfortunately, due to the sheer volume of applicants, authorities appear to have been unable to track exactly who was receiving SRD payments or whether the recipients were legitimate.

In analysing how, when, and why the SRD system was compromised, the report commissioned by SASSA outlines the following vulnerabilities in the department’s security infrastructure:

  1. API vulnerabilities – No rate limiting allowed mass querying of ID numbers, exposing application statuses.
  2. Data exposure & fraud risks – Sensitive applicant details were accessible, and high application rates suggested possible identity misuse.
  3. Unauthorised applications & payments – Grants were linked to ID numbers of non-applicants, raising misallocation concerns.
  4. Unofficial websites & phishing threats – Fake sites collected personal data, leading to financial loss and compliance risks.
  5. Authentication & phone-related risks – Multiple applications per number, SIM swap fraud, and inadequate cellphone ownership validation increased fraud potential.
  6. Encryption & security weaknesses – Poor encryption, missing security headers, and weak content security policies left data vulnerable.
  7. System & server vulnerabilities – Weak portal security, misconfigurations, directory enumeration risks, and unencrypted communications exposed the system to attacks.

For tech experts, this list reads like a how-not-to guide for cybersecurity, highlighting just how much SASSA’s lack of basic security protocols contributed to the breach. A reliance on old technology made the system an easy target for cybercriminals.

The report’s bottom line recommendations are clear: a serious overhaul of the department’s cybersecurity framework is long overdue.

The Lesson for Businesses: Don’t Repeat SASSA’s Mistakes

It’s easy to criticise the government’s lack of cyber preparedness and see it as yet another example of inefficiency, but the reality is that many businesses- both large and small- suffer from similar vulnerabilities.

  • A full-scale cybersecurity audit may sound expensive, but for larger businesses storing vast amounts of sensitive client data, it could be a necessity rather than a luxury.
  • No matter the size of your business, one of the most cost-effective ways to strengthen cybersecurity is through secure cloud storage, fully integrated across all the applications your team relies on.

To learn more about our range of data security products, including our comprehensive Total Data Protection (TDP) System, visit our website today.

Cloud Backup for Business & Home

Crowdstrike Outage Downs Windows – Technology

CrowdStrike Error Causes Chaos Globally 

The world suffered one of its biggest IT failures on record in July, as a single line of code in the CrowdStrike software update caused Windows computers around the world to freeze and display the “blue screen of death”.

The glitch in an update from the cybersecurity provider based in Austin, Texas was a rare but dramatic example of just how badly things can go wrong when technology fails.

Flights grounded, ICUs paralysed

The extent to which every process in modern society hinges on technology was on full display on July 19th as the faulty update caused airlines around the world to ground flights. 

In addition, hospitals in several countries were forced to reschedule surgeries and even ICU procedures since the computers controlling these critical processes were frozen and unusable. 

The update caused a logical error which caused Microsoft Windows computers to malfunction, switching them over to the blue screen – an outcome that no systems engineer ever wants to encounter. 

Unfortunately, scenes like this were played out around the world as critical computer systems remained temporarily frozen.

Capitec suffers day-long outagec

South Africa was largely spared the dramatic effects of the CrowdStrike incident, with the JSE issuing a notice stating that the FTSE indices were not updating. One of the big insurance companies was also affected as well as a major player in the banking industry that saw its systems remain off-line for most of the day.

Capitec’s ATM network, as well as its online banking facilities were non-functional, with customers unable to withdraw or transfer funds. 

After several hours of technical intervention, the bank’s IT team was able to restore functionality to the network, but many customers turned to social media to express their frustration about the outage. They also expressed concerns about the bank’s ability to manage their money safely.

The media hasn’t reported any financial losses as a result of the outage but it’s safe to assume that Capitec may suffer some reputational damage as a result. This incident underscores the potential for IT failures and cyberattacks to undermine the reputation of any business and highlights the importance of securing data with encrypted backup.

How to respond in the wake of a major tech failure

When a large, unexpected IT failure takes place, there are two major priorities for any IT manager or CIO: restoring functionality as soon as possible and recovering sensitive data to ensure business continuity.

  • The first of these objectives may be in the hands of third-party providers like Microsoft or CrowdStrike, but the safety of sensitive company data falls 100% in your company’s area of responsibility. 
  • Secure cloud storage is the only solution that guarantees data safety in the event of an unexpected failure or cyberattack – especially one at the scale seen on July 19. 

Effective and professional communication to clients also remains a priority during any outage in order to preserve trust and mitigate reputational damage. If this recent failure has you worried about your company’s important client data, investing in secure storage could be the best thing you do for your business this year. 

Soteria’s range of cloud storage packages – using immutable encryption – is the best place to start. Browse our range of packages for businesses of all sizes today.

Hidden Costs of Cyberattacks – Cybersecurity

Measuring the Hidden Costs of Cyberattacks on SMEs

Cyberattacks cost businesses around the world over $8 trillion in financial losses last year, but behind the dramatic headlines about costs that can be measured in Rands and cents is a hidden story of reputational damage and loss of credibility that can cost businesses a fortune in the long-term.

In this article we delve into the unstated losses that come in the wake of a cyberattack, study some common vulnerabilities, and find out how you can protect your business from the huge damage that hackers can do by breaching your data security.

Hidden Cost 1: Customer Confidence

One of the most valuable aspects of any brand is the confidence that customers place in the business and the word of mouth recommendations and positive online advocacy that this leads to.

On the flipside, however, once customers lose confidence in your business – especially if their personal data is stolen during a cyberattack – you need a comprehensive strategy to win back their trust or suffer reputational damage as a consequence.

It’s hard to quantify the exact amount that your business may lose as a result of declining customer confidence, but suffice to say that lost sales, a drop in referrals, and even online boycotts are all possible if your business suffers a major data leak or breach.

For some companies, the damage could run into millions or result in a major loss of business.

Hidden Cost 2: IP Theft

Intellectual property is becoming increasingly valuable with conceptual products accounting for 40% of US GDP in 2023.

Your confidential business plans or product prototypes falling into the wrong hands in a cyberattack could mean that your business could lose a competitive advantage, especially in the realm of manufacturing.

Copycat producers in countries with weak intellectual property laws are always waiting to undercut you in the market.

South African copyright and intellectual property laws are relatively strong and you’ll have a solid legal case to act against a local business that tries to copy your ideas – even if they’re stolen in a cyberattack.

Taking this type of action against a foreign business can be more tricky and certainly expensive, especially if international litigation becomes necessary.

Businesses should make sure that they’re insured against this type of outcome and that the amount of cover is sufficient to compensate them for the very real possibility of losses from IP theft.

Hidden Cost 3: Productivity Losses

Finally, a cyberattack can cause extended periods of downtime for your team as you struggle to bring your systems back online and eliminate the malware that was used in the attack.

During this time, your employees are likely to be distracted and less productive, and this could result in anything from delayed orders and invoicing to a total shutdown of operations for a  week .

For some businesses, this could equate to hundreds of thousands or millions of Rand in lost productivity.

Compliance Costs: When things get very real

The cost of compliance with the PPI Act is a fact that businesses should bear in mind when it comes to cyber risk.

The Information Regulator is authorised to fine companies up to R10 million if customer  information is mishandled in the event of a cyberattack. This is a very tangible amount for any business and underscores the importance of full legal compliance – no matter what size your enterprise may be.

The best way to avoid the hidden costs of cyberattacks is to make sure that your data is securely stored in encrypted form. Soteria’s range of secure storage packages for businesses provides all the data security that your enterprise needs. Visit our product page today to learn more.

Financial Impact of Cyberattacks | Cybersecurity

Quantifying the Financial Impact of a Cyberattack on SMEs – Cybersecurity

By now, most business owners who read our articles will be familiar with the financial impact that a Ransomware attack can have – and the amount of money that companies have had to pay cybercriminals to get their data back is just the tip of the iceberg.

The true cost of an online attack can be far more than the ransom demanded by hackers.

When factors like downtime, data recovery, forensics, system restoration, and potential fines from the Information Regulator are taken into account, falling prey to a cyberattack could cost your business hundreds of thousands or even millions of Rands.

In this article, we explore the financial impact of a cyberattack and provide some tips and tools for business owners to calculate the true cost.

Cyberattacks: what’s the damage?

Understanding the financial impact of a cyberattack is far easier when we consider the various costs that are involved in recovering from a crime like this.

A report from the Ponemon Instutite determined that of the 5 most vulnerable industries that experience data breaches – healthcare, financial, pharmaceutical, energy and industrial, the average cost of a breach in the healthcare industry exceeds $10,93 million (over R19 million).

In general, the cost of a cyberattack consists of the following factors:

  • Detection and client notification costs
  • Data recovery costs
  • Network restoration costs
  • The legacy costs of reputational damage and possible financial claims
  • Regulatory compliance fines

In the wake of a cyberattack or data breach, your business will need to jump into action.

In addition to having a cyberattack response plan so that your efforts remain calm and effective, you’ll need to quickly alert clients and anyone else whose data has been compromised and undertake the process of data recovery.

The POPI Act requires businesses to be good custodians of their clients’ data and take all possible steps to protect it before, during, and after a cybersecurity incident.

  • Failure to do so could result in heavy fines (capped at R10 million) or even prosecution.
  • Special insurance may be necessary for companies that handle vast amounts of client data should the incident be investigated by the Information Regulator.

In addition to compliance costs, expenses related to the restoration of your network can range from four to six figures depending on the size and scope of the damage.

  • Downtime following a cyberattack can cost your business a fortune in lost revenues and undeliverable products and services. A larger SMB or corporation may face millions of Rands in wasted productivity while its systems are down.

According to a 2023 study of hundreds of organisations, the average cost of recovery per file could amount to R2 750, which is an 8% increase from 2022. The costly consequence of a data breach can be determined by taking all of the above factors into consideration or by using one of the many “cost calculators” such as Arctic Wolf to estimate the cost to your company.

A major cyberattack could cost millions in total, but for a small monthly investment in secure cloud storage you can keep your data safe, updated, and encrypted.

Soteria’s range of cloud storage packages is the place to look if you’re serious about data security. To learn more, browse our product page or contact our team today.

Hackers and daring online scams | Cybersecurity

The Most Daring Online Scams 

At Soteria we work around the clock to help companies secure their data and prevent cyberattacks, and we will be the first to say that data security is no laughing matter.

Except when it is.

Hackers may be our sworn enemies, but we have to admit that some of the tactics and tricks they use to fool internet users, including some of the smartest people in the world, can be inspired and hilarious.

In this article, we take a lighter look at the world of cybersecurity and some of the crazy lengths cybercriminals have gone to in their quest to access your crucial private data.

The first hack in history

Hacking may be the scourge of the ultra-connected 21st-century, but illegal interception of communications started over 100 years ago.

Back in 1903, the Royal Institution was getting ready to demonstrate a new telegraph technology invented by Guglielmo Marconi. Just as the demonstration was about to kick off – with the kind of excitement you’d expect from a new iPhone release back when we still cared about them – the telegraph machine suddenly sprung to life with the word “rats” being repeated over and over on the ticker tape.

Before long, a dirty poem mocking Marconi arrived over the telegraph, causing a stir in the press. When the authorities investigated, they discovered that the magician Neville Maskelyne, who had a grudge against Marconi, had managed to intercept the telegraph transmission.

This was a sign of things to come 120 years later in our own time, when hackers routinely attack unpopular public figures or execute denial of service attacks on websites that they dislike.

Ocean’s 11 –  in a fish tank

The Internet of Things has brought about a situation where smart devices are connected in almost every office in the world, and some of them are so obscure that you’d never think to secure them.

Several years ago, a Las Vegas casino suffered a major data breach when hackers took control of the electronic sensors that monitor the water temperature and mineral content of one of its fish tanks. Once they gained access to the casino’s network, they were able to identify some highly sensitive unsecured data which they transmitted to Finland –  a fitting location for such a fishy crime.

X marks the spot for a celebrity bitcoin scam

In 2022, when X was still known as Twitter, the company’s current CEO Elon musk was one of many internet users scammed by a cybercriminal who offered to double any amount of bitcoin that they sent to him.

Needless to say, not one of the countless number of people who fell prey to the scam got even a cent back. Then again, since Elon is estimated to have overpaid by $19 billion when he bought Twitter he probably didn’t let the loss of a few bitcoin get him down.

Jokes aside:  you won’t be laughing if you’re the victim of a cyberattack

The ingenuity that cybercriminals have shown in cheating internet users out of their money is only going to get more impressive in the years to come.

Securing your network, updating your firewall and antivirus, and never responding to communications from anyone you don’t know and haven’t confirmed as the sender are three simple ways to stay safe online – but you these days you will likely need more protection.

Secure cloud storage offers a powerful layer of protection for your crucial data, with automated and encrypted backup ensuring that files are sent to the cloud on a regular basis to prepare your organisation for anything the dark web can throw at it.

Learn more about our range of packages for business and home users and take a powerful step in securing your data in the battle against hackers.

UK Data Breach | Hacker Cybercrime

Russian Hackers Claim Security Breach at BA, Boots and BBC

Russian hackers have struck at the heart of the UK’s business sector in a brazen attack on the BBC, popular pharmacy chain Boots, and British Airways, the country’s national carrier.

The attack was perpetrated by clOp Group, a well-known Russian cybercrime syndicate. The hackers targeted the “Three Bs” at a time when Britain is reeling from the effects of a cost of living crisis and the Russian war with Ukraine continues to divide public sentiment in Europe.

More than 100 000 employees’ personal information is said to have been compromised in this attack, with cybercriminals giving the companies until the middle of June to respond and begin negotiating their ransom.

how hackers penetrated three of Britain’s biggest brand names

Despite companies investing millions in cybersecurity, data breaches and ransomware attacks against prominent businesses continue to make the headlines.

  • Like many well-known cyberattacks, the recent data raid on some of Britain’s best-known brands was carried out using a vulnerability in an obscure piece of software, MOVEit.
  • The attack compromised Zellis, a trusted supplier of payroll services to the three Bs and reveals a new evolution in the future of cybercrime.
  • MOVEit may not be a familiar app to many of us, but it’s commonly used by enterprises to transfer files internally on their servers.
  • Hackers working for clOp exploited a vulnerability in the program and used it as a gateway to access a wealth of employee data which was later put up for ransom on the dark web.

As this case vividly illustrates, even seemingly secure software designed for enterprise use can contain weak links in the chain that cybercriminals can use to access valuable data. It also shows how cybercriminals are experimenting and learning from previous supply-chain attacks, targeting a mass -attack through one organisation to exploit a chain.

Improvements and patching can help close these loopholes, but it’s likely that hackers will simply find the next vulnerability to exploit. As the arms race ramps up, data belonging to businesses just like yours could be caught in the crossfire.

time to take data security seriously with encrypted cloud storage

The attack on Boots, British Airways, and the BBC was an attack on Britain’s sense of cyber safety.

Similar attacks have already occurred in South Africa, and as one of the countries with the highest incidence of cybercrimes in the world last year these events are only likely to become more common.

To protect your business data from a cyberattack in a landscape where falling victim to one is becoming extremely likely, you’ll need to keep it securely in the cloud in encrypted format.

Our range of secure cloud storage packages provide a virtual vault where your data can be accessed after a cyberattack – allowing you to get back to business sooner rather than later.

Twitter data breach | Data breach  

Twitter data breach leaves 5 million users at risk

Twitter has revealed that a major data breach in January resulted in more than 5,4 million users’ personal data being lost to hackers. To make matters worse, this information is now being given away on the dark web – potentially putting millions of phone numbers and email addresses at risk of being compromised.

The social media giant, which was recently acquired by Elon Musk, is undergoing a dramatic restructuring as it struggles to retain advertisers.

This latest revelation about data security will add a further layer of challenges to the task ahead for Multi-billionaire Musk and his latest acquisition, as the company does damage control to regain user trust.

One cybersecurity slip up compromises millions of accounts.

Every business handles customer data, but when it comes to social media giants like Twitter, the sheer volume of sensitive information is staggering.

With almost 400 million registered users worldwide the platform is a major target for cybercriminals, and once in a while they manage to breach the company’s powerful online defences.

January’s incident, which was carried out by exploiting an API vulnerability, resulted in millions of users entering sensitive information only to have it stolen by hackers.

The feature that allows Twitter users to find the Twitter ID of other users by submitting their email address or phone number proved to be especially vulnerable to attack. This flaw in the platform’s API mirrors recent incidents in which location-enabled apps like EskomSePush and WeChat have been used by criminals to carry out a variety of illegal activities.

Stay safe while you get social

Keeping your personal data safe when using social media apps is essential in the current cybersecurity climate. Here are some tips that will help keep hackers away.

  • Change your passwords. You should aim to do this at least once a year, with once every three months being ideal.
  • Opt for two factor authentication. This will help ensure that you and only you have access to your account.
  • Beware suspicious messages and emails. You’ll never be required to provide your login details via email. If you can’t do it using the app, it’s probably not legit.

About Soteria Cloud

Based in Cape Town, Soteria offers a full range of cloud storage packages suited to the needs of businesses and families alike. Keep your data safe in the cloud with us.