The beginning of the new year was marked by a bunch of major information security incidents. Let’s dive into the incidents, which happened with the International Civil Aviation Organization and South Africa Govchain and Cell C companies.
Notably, both cybersecurity incidents in South Africa occurred almost simultaneously. On the 3rd of January, Govchain, a South African financial company, reported a data breach. Govchain is providing services related to the field of registration and compliance for business units. Thus, the company processes very sensitive data of numerous legal entities.
According to the report, a breach was noticed by the company’s security system, which registered a huge amount of errors. Govchain reacted to the incident by blocking access to its servers, deactivating applications, and launching an investigation. Under the guidelines of the Protection of Personal Information Act, Govchain notified the local Information Regulator and affected data subjects. Non-compliance with South African data protection legislation can result in fines of up to 525,000 United States dollars or imprisonment.
Company representatives claimed that the breach could potentially compromise some personal information. The exposed data set could potentially include documents required for the Financial Intelligence Centre Act verification and other register records sharing.
Cell C, a South African telecom company, reported a cybersecurity incident on the 8th of January. According to the official statement, the incident affected parts of the company’s IT environment, and as a result, some customer data was exposed. The company officials noted the South African Information Regulator and started the proper investigation process.
It’s assumed that the amount of leaked data is around 2 TB. According to the preliminary findings, this leak was a result of phishing attacks, which took place earlier in 2023 and 2024. According to the official statement by Cell C’s Information Officer “Initial findings indicate that data related to a limited number of individuals may have been accessed by an unauthorized party.”
According to research company TFI, exposed data could contain credentials for a wide range of internal services and external portals, including Cell C’s fiber-to-the-home customer operations. As a result, a malicious actor could acquire private personal data, manipulate service orders, and compromise billing records through access to portals of other fiber network operators.
At the start of January, the International Civil Aviation Organization (ICAO) was targeted by a successful cyberattack. ICAO announced that it is investigating a “potential information security incident.” According to the claims, the stolen archive contains 2GB of data, which includes such information as:
ICAO has confirmed that the incident affected data from around 42,000 recruitment applications from 2016 to 2024. ICAO is now reaching out to 11,929 affected persons. According to the official statement, malicious actors gained only limited access to recruitment servers and failed to obtain any passwords, banking details or documents uploaded by applicants.
Thus, this incident didn’t affect any system related to aviation safety or security operations. It’s worth mentioning that a previous cyberattack targeted ICAO in 2016, and the organization stated that it will enhance security measures to prevent potential incidents.
The incident with South African company Cell C highlights the importance of robust and effective cybersecurity. Phishing attacks are usually used as a staging ground for further attacks. Almost half of successful cyberattacks used credentials gained from previous phishing attacks. Companies can empower cybersecurity by the means of security awareness training. Security culture is a cornerstone of cyber protection. A simple step-by-step manual for employees can empower the whole structure of the company’s defense against external threats. Take a brief look at our guide for detection of phishing emails.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!