Avatar photo

By Sasha Planting

Moneyweb: Deputy Editor


SA second most targeted by hackers in the world

Cyberattacks have become difficult to counter as criminals up the ante on SA firms.


While financial services company Liberty may have suffered the biggest data breach ever in South Africa, losing between 20 and 40 terabytes of data contained in e-mails and attachments, it is not the only listed company to have been targeted by hackers.

JSE-listed construction materials firm Afrimat has been the target of several hacking attempts. Most recently a third-party contractor inadvertently released a day-zero attack into its network. This is a cyberattack that occurs on the same day a weakness is discovered in software (which means no anti-virus software will pick it up), enabling hackers to exploit the gap before a fix becomes available from its creator.

“We became aware of the attack as it happened and were able to stop it at the point of infection,” said Johan du Plessis, GM of technology systems at Afrimat.

Who the hackers were and what their objective was, one can only speculate. “These guys are almost impossible to trace,” he added.

In another attack, ransomware infected the company’s development server. This is malicious software that blocks access to a computer’s files until a sum of money is paid.

“Our systems picked this up immediately and ensured that it could not be distributed to our other servers and devices on the network,” said Du Plessis. “We could then isolate the software before it could do real harm or cause a loss of production.”

Afrimat was not always so lucky. Two years ago ransomware infected its entire server environment.

“The attack happened on Saturday and we discovered it on the Sunday. We were down for nine hours but we had a disaster recovery plan and were able to get the systems back up before operations began on Monday morning.”

At that point J2 came on board and they deployed their layered approach to cybersecurity.

“It was a matter of time before one of these attacks caused real damage,” Du Plessis said.

According to PwC’s Global Economic Crime and Fraud Survey for 2018, South Africa is the second most targeted country in the world when it comes to cyberattacks. The reason for this, said John McLoughlin, CEO of J2 Software, was a combination of naive users, poor policing and immature laws.

While South Africa’s Protection of Personal Information (PoPI) Act was signed into law in 2013, it has not become fully operational as the regulator is not yet operational. PoPI is also not as prescriptive as Europe’s General Data Protection Regulation (GDPR), which became operational at the end of May this year, adds McLoughlin.

The GDPR requires that businesses take steps to protect the personal data and privacy of the EU citizens who are their clients. Unlike PoPI, if something goes wrong and private data falls into the wrong hands, that company is required to inform their clients within 72 hours.

“The reason you have never heard of data breaches at listed companies is not because they have not happened, it’s because they don’t have to tell you,” adds McLoughlin.

Afrimat came to recognise that most cyberthreats are activated from within a network – so building the highest wall possible is not effective.

“We started small, applying J2’s layered approach to security,” said Du Plessis.

The first layer included installing anti-virus software on every machine and mobile device that accessed the company’s network. The second layer saw Afrimat setting up a system to protect itself from the world wide web (the system advises which sites employees can and can’t visit and what software they can and can’t download). The third layer focuses on email – the number one way hackers target businesses and employees.

“Every email is scrutinised by the software, with the result that about 60% of mails coming into the company are stopped because they are spam or malicious,” Du Plessis said.

He added: “We have not taken these steps because we suspect our staff of malicious attacks. Very often the user acts innocently – by inadvertently clicking, downloading or opening something that is potentially dangerous.”

A year later Afrimat added another layer of security in the form of behavioural analytics. This does not mean a beefcake of a man is watching employees’ every move via hidden cameras. Instead a software system called Dtex monitors users’ online behaviour.

“We have no interest in what our users are doing until they do something unusual, and it is this that the system flags,” said Du Plessis. “For instance, is someone copying large quantities of data? Are they saving it to an external drive? This is what we want to know.”

While Afrimat has not had to march anyone off its premises, one Cape Town based call centre operator had done so, said McLoughlin.

The call centre ran several concurrent campaigns for financial service providers, with Chinese walls separating each campaign, and one overarching manager. It turned out that one manager began accumulating user data from the different campaigns, which she compiled into a ‘work’ folder. She then uploaded this into her Google drive. This was unusual and the system flagged it as such.

“Within an hour she was marched out the building,” McLoughlin said.

Visibility over your network and what your people are doing is like gold, he adds. The minute someone clicks on something that is compromised, you need to know. “Yet it takes the average company 220 days to know they have been breached.”

In Liberty’s case, the company knew there had been a breach of its systems because the hackers told them so, and then proved it by publishing some of the information – since removed.

“It’s scary out there,” said Du Plessis. “It’s not so much about cybersecurity – it’s about cyber-resilience. It’s not if, it’s when. And then, are you able to bounce back within four hours with no loss – either physical or reputational?”

Brought to you by Moneyweb

Read more on these topics

hackers

Access premium news and stories

Access to the top content, vouchers and other member only benefits