Close Menu
Business explainer
    • ABOUT
    • BOOK STORE
    • ENTREPRENEURSHIP
    • ESG
    • EVENTS & AWARDS
    • POLITICS
    • GADGETS
    • CONTACT
    X (Twitter) LinkedIn Facebook
    Business explainerBusiness explainer
    • TRENDING
    • EXECUTIVES
    • COMPANIES
    • STARTUPS
    • GLOBAL
    • OPINION
    • DEALS
    • ECONOMY
    • MOTORING
    • TECHNOLOGY
    Business explainer
    Home » REPORT: Cyber groups are actively targeting SA Government
    TECHNOLOGY

    REPORT: Cyber groups are actively targeting SA Government

    August 23, 2023By Staff Writer
    President Cyril Ramaphosa

    Government organizations in South Africa are the primary targets for cyber threat actors, according to the latest data from cybersecurity company Trellix. In the second quarter of 2023, 26% of all detected threat activity was directed towards government systems.

    1. Business service providers and wholesalers’ networks followed closely as targets, with 16% and 14% of detected threat activity, respectively. Utilities’ systems accounted for 12% of the detected threat activity. Threat activity tended to peak on Mondays and Fridays.
    2. Trellix identified specialized, well-equipped, and highly skilled threat actors operating in South Africa. These threat actors demonstrate interconnections with extensive networks and potential state support, suggesting a coordinated and sophisticated approach to their malicious activities.
    3. The Lazarus Group and Daggerfly Advanced Persistent Threats (APT) Group were highlighted as notable threat actors that have intensified their efforts to infiltrate critical South African systems. The Lazarus Group, associated with a North Korean state-sponsored APT syndicate, deploys various tools and capabilities for its operations, including DDoS botnets, keyloggers, remote access tools (RATs), and wiper malware.
    4. The Daggerfly APT, suspected to have affiliations with China, has exhibited increased activity in Africa, with a focus on targeting telecommunications organizations. This threat actor primarily aims at information gathering and utilizes methods like PlugX loaders and living off the land tooling to conduct long-term campaigns. These threat actors employ trail obfuscation techniques, making it challenging for investigating teams to analyze their malicious artifacts and detect their presence effectively.

    Related Posts

    Hackers Build Academy to Train Africa’s Cyber Defenders

    February 1, 2026

    How Digital Compliance Training Could Dominate Costs

    January 30, 2026

    Your Data Shouldn’t Expire — Kastelo Says the Industry is Finally Catching up

    January 30, 2026
    Top Posts

    Government Launches Infrastructure Bonds to Attract Investors

    November 27, 2025

    Seven Families Sue OpenAI In ChatGPT Suicide Scandal

    November 10, 2025

    The Key Forces Influencing South Africa’s SME Economy

    November 21, 2025

    PMI South Africa Names Datacentrix Among Elite Project Management Offices

    October 27, 2025
    Don't Miss
    COMPANIES

    inDrive Holds No.2 Spot in Global Ride-Hailing Rankings

    COMPANIES

    inDrive has retained its position as the world’s second most downloaded ride-hailing app for the…

    Checkers Tops SA Brand Rankings

    Woolworths Bets Big on Digital Loyalty

    Gauteng Secures R2bn Manufacturing Project

    Stay In Touch
    • Twitter
    • LinkedIn
    • Facebook
    About Us
    About Us

    From the latest product launches and company earnings to economic trends and industry disruptions, we distill the most critical details and implications – breaking through the jargon and wordiness to give you just what matters most.

    Facebook X (Twitter) LinkedIn
    Categories
    • TRENDING
    • EXECUTIVES
    • COMPANIES
    • STARTUPS
    • GLOBAL
    • OPINION
    • DEALS
    • ECONOMY
    • MOTORING
    • TECHNOLOGY
    contact us
    • Get In Touch
    © 2026 Business Explainer.
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.