Friday, April 19, 2024

Ransomware Attack on Electric Power Grid in South Africa Encrypt’s the Entire Network

Hackers attack Electric utility City Power on Johannesburg, South Africa using powerful ransomware and take down the entire network, applications, and database.

Recent days threat actors mainly targeting the government network, cities, municipalities around the world to demand the huge amount of ransom.

The attackers hit the power grid with unknown ransomware and encrypt all the data which blocks the client to buy electricity from its website.

City Power’s Twitter feed offered the following details: “City Power has been hit by a Ransomware virus. it has encrypted all our databases, applications and network. Currently, our ICT department is cleaning and rebuilding all impacted applications.

Followed by the previous tweet, another tweet stated that the ransomware infection let customer stop uploading the invoice and buying electricity from their own website.

A voice message on City Power’s phone helpline says “Dear customers, please note that we are currently experiencing a problem with our prepaid vending system,”

According to spokesperson Isaac Mangena “Customers will be able to access vending and buy electricity. However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website,” 

The U.S. Conference of Mayor’s report said, As of July 2019, ransomware attacks have hit at least 170 county, city, or state government systems since 2013, and 22 of those attacks occurred in the first half of 2019.

City Power has created a temporary alternative to their customers and the experts are currently investigating the cause of this attack.

The very recent tweet stated that ” So far most of the IT applications and networks that were affected by the cyberattack have been cleaned up and restored “

“However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website”

You can read the complete guide of Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Website

Latest articles

Palo Alto ZeroDay Exploited in The Wild Following PoC Release

Palo Alto Networks has disclosed a critical vulnerability within its PAN-OS operating system, identified...

FIN7 Hackers Attacking IT Employees Of Automotive Industry

IT employees in the automotive industry are often targeted by hackers because they have...

Russian APT44 – The Most Notorious Cyber Sabotage Group Globally

As Russia's invasion of Ukraine enters its third year, the formidable Sandworm (aka FROZENBARENTS,...

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is...

LeSlipFrancais Data Breach: Customers’ Personal Information Exposed

LeSlipFrancais, the renowned French underwear brand, has confirmed a data breach impacting its customer...

Cisco Hypershield: AI-Powered Hyper-Distributed Security for Data Center

Cisco has unveiled its latest innovation, Cisco Hypershield, marking a milestone in cybersecurity.This groundbreaking...

Phishing-as-a-Service Platform LabHost Seized by Authorities

Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across...
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

WAAP/WAF ROI Analysis

Mastering WAAP/WAF ROI Analysis

As the importance of compliance and safeguarding critical websites and APIs grows, Web Application and API Protection (WAAP) solutions play an integral role.
Key takeaways include:

  • Pricing models
  • Cost Estimation
  • ROI Calculation

Related Articles