SOCRadar’s“Africa Threat Landscape”report provides a clear overview of the current cyber challenges in Africa, revealing a high volume of diverse malicious activity on the dark web. Here are the key takeaways:

  • Sale of Stolen Data Tops the List: More than 56% of activity on the dark web involves the sale of data, particularly personal, financial, and corporate databases (accounting for nearly 70% of threats). This data fuels identity theft, fraud, and large-scale attacks.
  • Information sharing and the access market: 39% of activities involve sharing information, while 22% involve selling access to systems, facilitating the deployment of ransomware or intrusions.
  • A wide variety of ransomware groups: 74% of activity is attributed to unidentified actors or “others,” reflecting a fragmented landscape characterized by small, short-lived campaigns. Among the known groups, RansomHub, FunkSec, and KillSec are active but relatively few in number.
  • Sophisticated phishing: The majority of phishing pages use HTTPS (80%) to deceive victims. Generic titles such as “My Site” (24%) are most common, but targeted attempts on platforms like Telegram are also widespread.
  • A worrying trend: The apparent security of HTTPS sites has become the norm, making detection more difficult. There is an urgent need to adopt advanced defense strategies

Key recommendations for CISOs:

  • Deployment of dark web monitoring tools
  • Strengthening resilience against ransomware (backups, testing)
  • Phishing Detection and Increased Awareness
  • Enhanced protection of sensitive data (MFA, encryption, access control)
  • Securing critical infrastructure
  • Sharing information with partners and authorities
Image microsegmentation

The African cybersecurity landscape is characterized by a multitude of small players operating in a highly dynamic environment. Collaboration, technological innovation, and vigilance remain our greatest assets in anticipating and countering these threats.

HTBS Africa is here to help you with:

  • Identify the critical areas of your network
  • Implement detailed, fast, and scalable segmentation
  • Reduce your attack surface without compromising performance
Share: