Ransomware Attack on Electric Power Grid in South Africa Encrypt’s the Entire Network

Hackers attack Electric utility City Power on Johannesburg, South Africa using powerful ransomware and take down the entire network, applications, and database.

Recent days threat actors mainly targeting the government network, cities, municipalities around the world to demand the huge amount of ransom.

The attackers hit the power grid with unknown ransomware and encrypt all the data which blocks the client to buy electricity from its website.

City Power’s Twitter feed offered the following details: “City Power has been hit by a Ransomware virus. it has encrypted all our databases, applications and network. Currently, our ICT department is cleaning and rebuilding all impacted applications.

Followed by the previous tweet, another tweet stated that the ransomware infection let customer stop uploading the invoice and buying electricity from their own website.

A voice message on City Power’s phone helpline says “Dear customers, please note that we are currently experiencing a problem with our prepaid vending system,”

According to spokesperson Isaac Mangena “Customers will be able to access vending and buy electricity. However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website,” 

The U.S. Conference of Mayor’s report said, As of July 2019, ransomware attacks have hit at least 170 county, city, or state government systems since 2013, and 22 of those attacks occurred in the first half of 2019.

City Power has created a temporary alternative to their customers and the experts are currently investigating the cause of this attack.

The very recent tweet stated that ” So far most of the IT applications and networks that were affected by the cyberattack have been cleaned up and restored “

“However, work is still continuing on some systems and applications that were affected including the uploading of invoices by our suppliers, and logging faults by customers on the website”

You can read the complete guide of Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Recent Posts

Critical Vulnerability in Ubiquiti UniFi Protect Camera Allows Remote Code Execution by Attackers

Critical security vulnerabilities in Ubiquiti’s UniFi Protect surveillance ecosystem-one rated the maximum severity score of…

41 minutes ago

IXON VPN Client Vulnerability Allows Privilege Escalation for Attackers

A critical security vulnerability in IXON’s widely used VPN client has exposed Windows, Linux, and…

47 minutes ago

Cisco IOS Software SISF Vulnerability Could Enable Attackers to Launch DoS Attacks

Cisco has released security updates addressing a critical vulnerability in the Switch Integrated Security Features…

48 minutes ago

Seamless AI Communication: Microsoft Azure Adopts Google’s A2A Protocol

Microsoft has announced its support for the Agent2Agent (A2A) protocol, an open standard developed in…

53 minutes ago

Radware Cloud Web App Firewall Flaw Allows Attackers to Bypass Security Filters

Security researchers have uncovered two critical vulnerabilities in Radware’s Cloud Web Application Firewall (WAF) that…

1 hour ago

ESET Reveals How to Spot Fake Calls Demanding Payment for ‘Missed Jury Duty’

ESET, a leading cybersecurity firm, has shed light on one particularly insidious scheme: fake calls…

1 hour ago