• Products
  • Services
  • Compliance
  • Resources
  • Partners
  • Book a Return Call
  • English
    • العربية
    • Türkçe
    • Español
    • Português
  • All Products
    SearchInform DLP
    SearchInform Risk Monitor
    SearchInform ProfileCenter
    SearchInform FileAuditor
    SearchInform SIEM
    TimeInformer
    Cloud solutions
    Third-party integration
    All Services
    SearchInform MSS
    SearchInform for MSSP
    SearchInform solution in the cloud
    All Resources
    White Papers
    Research
    How to
    Practices and use cases
    Videos
    All Challenges
    Abnormal event detection
    Data loss prevention
    Employee with problems
    Data visibility
    Behavioral risk management
    Measuring employee morale
    Compliance
    Time tracking & employee monitoring software
    Corporate fraud
    Ransomware protection
    Data at rest discovery
    Real time monitoring
    Data encryption
    Investigation
    Employee Profiling
    Personal data protection
    All Roles
    C-level executive
    Compliance manager
    Risk manager
    Information security analyst
    Internal audit officer
    Chief Human Resources Officer
    All Industries
    Business Services
    Technology
    Education
    Healthcare
    Financial Services
    Retail
    Government
    Energy
    Insurance
    Hospitality
    Manufacturing
    Construction
    Compliance with SearchInform
    SAMA Cybersecurity Framework
    GDPR
    Personal Data Protection Bill
    Compliance with Data Cybersecurity Controls
    Compliance with Kingdom of Saudi Arabia Personal Data Protection Law
    SearchInform Partners
    Become a Partner
    Partner login
    Events
    News
    About our company
    Blog
    Contact Us
    Language:
    • English
    • العربية
    • Türkçe
    • Español
    • Português
    Follow us:
    Book a Return Call
Home — Blog — ICAO and South African Companies Fell Victim to Data Related Incidents
Back
BACK TO BLOG LIST
ICAO and South African Companies Fell Victim to Data Related Incidents
16.01.2025

The beginning of the new year was marked by a bunch of major information security incidents. Let’s dive into the incidents, which happened with the International Civil Aviation Organization and South Africa Govchain and Cell C companies.

Notably, both cybersecurity incidents in South Africa occurred almost simultaneously. On the 3rd of January, Govchain, a South African financial company, reported a data breach. Govchain is providing services related to the field of registration and compliance for business units. Thus, the company processes very sensitive data of numerous legal entities.

According to the report, a breach was noticed by the company’s security system, which registered a huge amount of errors. Govchain reacted to the incident by blocking access to its servers, deactivating applications, and launching an investigation. Under the guidelines of the Protection of Personal Information Act, Govchain notified the local Information Regulator and affected data subjects. Non-compliance with South African data protection legislation can result in fines of up to 525,000 United States dollars or imprisonment.

Company representatives claimed that the breach could potentially compromise some personal information. The exposed data set could potentially include documents required for the Financial Intelligence Centre Act verification and other register records sharing.

Cell C, a South African telecom company, reported a cybersecurity incident on the 8th of January. According to the official statement, the incident affected parts of the company’s IT environment, and as a result, some customer data was exposed. The company officials noted the South African Information Regulator and started the proper investigation process.

It’s assumed that the amount of leaked data is around 2 TB. According to the preliminary findings, this leak was a result of phishing attacks, which took place earlier in 2023 and 2024. According to the official statement by Cell C’s Information Officer “Initial findings indicate that data related to a limited number of individuals may have been accessed by an unauthorized party.”

According to research company TFI, exposed data could contain credentials for a wide range of internal services and external portals, including Cell C’s fiber-to-the-home customer operations. As a result, a malicious actor could acquire private personal data, manipulate service orders, and compromise billing records through access to portals of other fiber network operators.

At the start of January, the International Civil Aviation Organization (ICAO) was targeted by a successful cyberattack. ICAO announced that it is investigating a “potential information security incident.” According to the claims, the stolen archive contains 2GB of data, which includes such information as:

  • Names
  • Dates of birth
  • Addresses
  • Phone numbers and email addresses
  • Other data from potential candidates’ CVs.

ICAO has confirmed that the incident affected data from around 42,000 recruitment applications from 2016 to 2024. ICAO is now reaching out to 11,929 affected persons. According to the official statement, malicious actors gained only limited access to recruitment servers and failed to obtain any passwords, banking details or documents uploaded by applicants.

Thus, this incident didn’t affect any system related to aviation safety or security operations. It’s worth mentioning that a previous cyberattack targeted ICAO in 2016, and the organization stated that it will enhance security measures to prevent potential incidents.


The incident with South African company Cell C highlights the importance of robust and effective cybersecurity. Phishing attacks are usually used as a staging ground for further attacks. Almost half of successful cyberattacks used credentials gained from previous phishing attacks. Companies can empower cybersecurity by the means of security awareness training. Security culture is a cornerstone of cyber protection. A simple step-by-step manual for employees can empower the whole structure of the company’s defense against external threats. Take a brief look at our guide for detection of phishing emails.


BACK TO BLOG LIST
Letter Subscribe to get helpful articles and white papers. We discuss industry trends and give advice on how to deal with data leaks and cyber incidents.
Email
By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement.
FileAuditor
DLP
Risk Monitor
ProfileCenter
SIEM
MSS
MSSP
Cloud Deployment
Contact
About Our Company
Our Clients
Press About Us
Press Kit
White Papers
Third-party integration
Research
Practices and use cases
Videos
Company News
Product News
Events
Blog
Compliance
Data Loss Prevention
Investigation
Data at Rest Discovery
Data Encryption
Data Visibility
Data Classification and Protection
Time Tracking and Employee
Monitoring
Corporate Fraud Mitigation
C-level executive
Risk manager
Internal audit officer
Compliance manager
Information security analyst
Chief Human Resources Officer
Business Services
Education
Financial Services
Government
Insurance
Manufacturing
Healthcare
Retail
Energy
Hospitality
Construction
SearchInform partners
Become a partner
Partner login
SearchInform products are recognized by
Gartner The Radicati Group
Follow us:
© 2025 SearchInform LTD All rights reserved.
Terms of Use
Licence
Privacy&Cookies
Cookie settings
We use cookies to analyze our website usage, make our service more effective, and improve user experience. By continuing to use our website, you are agreeing to our policy.
Ok
Settings
Cookie Policy
✖

SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.

CATEGORY
DESCRIPTION
STATUS

Necessary Cookies

Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files record on the Internet Settings tab in your browser.

Functional Cookies

These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.

Performance Cookies

These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.

Third-party Cookies

These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.

Save Settings
✖

Please enable Functional Cookies

You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.

Cookie settings

Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.
 

Subscribe to our newsletter and receive case studies in comics!

By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time.