Thursday, October 10, 2024
HomeComputer SecurityRansomware Attack on Electric Power Grid in South Africa Encrypt's the Entire...

Ransomware Attack on Electric Power Grid in South Africa Encrypt’s the Entire Network

Published on

Hackers attack Electric utility City Power on Johannesburg, South Africa using powerful ransomware and take down the entire network, applications, and database.

Recent days threat actors mainly targeting the government network, cities, municipalities around the world to demand the huge amount of ransom.

The attackers hit the power grid with unknown ransomware and encrypt all the data which blocks the client to buy electricity from its website.

- Advertisement - EHA

City Power’s Twitter feed offered the following details: “City Power has been hit by a Ransomware virus. it has encrypted all our databases, applications and network. Currently, our ICT department is cleaning and rebuilding all impacted applications.

Followed by the previous tweet, another tweet stated that the ransomware infection let customer stop uploading the invoice and buying electricity from their own website.

A voice message on City Power’s phone helpline says “Dear customers, please note that we are currently experiencing a problem with our prepaid vending system,”

According to spokesperson Isaac Mangena “Customers will be able to access vending and buy electricity. However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website,” 

The U.S. Conference of Mayor’s report said, As of July 2019, ransomware attacks have hit at least 170 county, city, or state government systems since 2013, and 22 of those attacks occurred in the first half of 2019.

City Power has created a temporary alternative to their customers and the experts are currently investigating the cause of this attack.

The very recent tweet stated that ” So far most of the IT applications and networks that were affected by the cyberattack have been cleaned up and restored “

“However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website”

You can read the complete guide of Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...

Multiple VMware NSX Vulnerabilities Let Attackers Gain Root Access

VMware has disclosed multiple vulnerabilities in its NSX product line that could potentially allow...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Exploiting Zero-day Flaw in Qualcomm Chips to Attack Android Users

Hackers exploit a zero-day vulnerability found in Qualcomm chipsets, potentially affecting millions worldwide.The flaw,...

Foxit PDF Reader Vulnerability Let Attackers Execute Arbitary Code

Researchers recently disclosed six new security vulnerabilities across various software, as one critical vulnerability...

Wireshark 4.4.1 Released, What’s new!

Wireshark, the world’s leading network protocol analyzer, has just released version 4.4.1, bringing a...