SA Social Security Agency Releases Report on Large-Scale Cybersecurity Breach
The South African Social Security Agency (SASSA) has released an in-depth report following a large-scale breach of its cyber defences last year which is alleged to have cost taxpayers an estimated R175 million.
The findings raise serious questions about the cybersecurity protocols in place at government departments and suggest several key areas for improvement.
While the cyberattack on SASSA was significant, it was not unique. With organisations of all sizes increasingly falling prey to hackers and cybercriminals, the report offers valuable lessons that every organisation can implement.
Let’s take a closer look at what happened, what the investigation uncovered, and how businesses can use this information to keep their own data safe.
Large-Scale Cybersecurity Breach Detected by University Students
When hackers breached SASSA’s defences, they helped themselves to an enormous sum of money which was ultimately financed by South African taxpayers. The hacking group N4ughtySecGroup, which claimed responsibility, alleged that the amount stolen exceeds R175 million.
A troubling revelation for commentators and the public is that the breach wasn’t detected by the department itself. In fact it was first-year computer science students Joel Cedras and Veer Gosai from Stellenbosch University who stumbled upon it while working on a research project.
In the wake of their discovery, SASSA launched an investigation, with cybersecurity specialist Stanly Machote and auditing firm Masegare & Associates tasked with uncovering how such a critical security failure had occurred.
The report, recently presented to Parliament, outlines the modus operandi of those responsible, though their identities remain classified.
- The hackers exploited vulnerabilities in the Social Relief of Distress (SRD) grant system, which was introduced during the COVID-19 lockdown as a R350-per-month survival grant.
- The government later extended these payments as a form of universal basic income for struggling families. Unfortunately, due to the sheer volume of applicants, authorities appear to have been unable to track exactly who was receiving SRD payments or whether the recipients were legitimate.
In analysing how, when, and why the SRD system was compromised, the report commissioned by SASSA outlines the following vulnerabilities in the department’s security infrastructure:
- API vulnerabilities – No rate limiting allowed mass querying of ID numbers, exposing application statuses.
- Data exposure & fraud risks – Sensitive applicant details were accessible, and high application rates suggested possible identity misuse.
- Unauthorised applications & payments – Grants were linked to ID numbers of non-applicants, raising misallocation concerns.
- Unofficial websites & phishing threats – Fake sites collected personal data, leading to financial loss and compliance risks.
- Authentication & phone-related risks – Multiple applications per number, SIM swap fraud, and inadequate cellphone ownership validation increased fraud potential.
- Encryption & security weaknesses – Poor encryption, missing security headers, and weak content security policies left data vulnerable.
- System & server vulnerabilities – Weak portal security, misconfigurations, directory enumeration risks, and unencrypted communications exposed the system to attacks.
For tech experts, this list reads like a how-not-to guide for cybersecurity, highlighting just how much SASSA’s lack of basic security protocols contributed to the breach. A reliance on old technology made the system an easy target for cybercriminals.
The report’s bottom line recommendations are clear: a serious overhaul of the department’s cybersecurity framework is long overdue.
The Lesson for Businesses: Don’t Repeat SASSA’s Mistakes
It’s easy to criticise the government’s lack of cyber preparedness and see it as yet another example of inefficiency, but the reality is that many businesses- both large and small- suffer from similar vulnerabilities.
- A full-scale cybersecurity audit may sound expensive, but for larger businesses storing vast amounts of sensitive client data, it could be a necessity rather than a luxury.
- No matter the size of your business, one of the most cost-effective ways to strengthen cybersecurity is through secure cloud storage, fully integrated across all the applications your team relies on.
To learn more about our range of data security products, including our comprehensive Total Data Protection (TDP) System, visit our website today.
Cloud Backup for Business & Home