Johannesburg city under ransomware attack, again
Johannesburg, South Africa's largest city, faces another ransomware attack, months after a crippling infection lead to a blackout on 25 July.
A hacker group that uses the alias Shadow Kill Hackers managed to infect the internal network of the city administration. They are threatening to distribute the authentication and monetary details of millions of citizens online unless they are paid four bitcoins (Apx £25,000) by October 28 at 5 pm local time.
"We have dozens of back doors inside your city. We have control of everything in your city. We also compromised all passwords and sensitive data such as finance and personal population information," reads the ransom note, a screenshot of which has been posted on Twitter.
The city administration has responded by taking all e-services and websites connected to its homepage offline.
"The City of Johannesburg has detected a network breach which resulted in unauthorised access to its information systems," the municipality’s tweet said.
"As a result, several customer-facing systems - including the City’s website, e-services; billing system (SAP ISU and CRM) - have been shut down as a precautionary measure. The investigation, which is set to take 24 hours, means that customers will not be able to transact on e-services or log queries via the City’s Call Centre or Customer Service Centres," it said.
City Power, one of the largest power suppliers in Johannesburg, faced a ransomware infection that leads to a blackout on 25 July. Customers could not load prepaid electricity on the payday of the month.
Cities and municipalities are easy targets for cyber-criminals as they usually lack the budget and skills to set up sufficient security and monitoring, commented Ilia Kolochenko, CEO of ImmuniWeb.
"Worse, they have critical and/or sensitive IT systems that generate incalculable losses if unavailable. Payments in bitcoins largely exacerbate the situation by making attacks virtually untraceable and non-investigable," he said.
Hundreds of municipalities in the US have been hit by ransomware this year, leading to severe disruptions in civic services. Most of them have opted to pay the ransom.
"It is not clear whether Johannesburg opted to pay the attackers following the first incident, but if they did this could be the attackers having another bite at the Apple," noted Andrea Carcano, co-founder and CPO of Nozomi Networks.
"One of the biggest problems victims face when they are infected with ransomware is deciding whether or not to pay. Some feel they have no choice but to give in to hackers demands as the consequences of losing data would be far worse, while others opt to take the hit or rely on backups to get their systems back up and running," he said.
Industry: Cyber Security
- IAM developer - Saviynt
- United Kingdom
- Upto £60,000 plus benefits
IAM developer/ Consultant is required for a global consultancy who are looking to expand their deployment team within the UK Looking for a IAM developer who has experience with at least one of the following vendors Saviynt, Clearskye, Beyond Trust or Okta You will be part of a deployment team, involved in a number of high profile projects Key duties will be: implement IAM solutions to ensure secure access to applications, systems, and data for authorized users. This may involve integrating technologies and standards such as SAML, OAuth, LDAP, and RBAC. Conduct IAM audits and assessments: to identify vulnerabilities, gaps, and areas for improvement. Provide IAM support and troubleshooting and resolve incidents related to user access, authentication, and authorization.
- Lead Cyber Security Incident Response Consultant.
- United Kingdom
Seeking skilled and passionate UK-based individual for a Lead Cyber Security Incident Response Consultant opportunity 3 core skillsets for the role Hands on technical incident response (triage and planning). Business consultancy (engaging with clients). Commercial awareness. Being able to engage in business growth conversations. Consultancy experience is an essential as it the ability to visit clients and the office. Additional experience will include, but not be limited to: Developing incident response strategies, guides and procedures for effective incident handling Proactive and reactive defense plans based on cyber threat actors' techniques Offering guidance, supervision, and fostering opportunities for team development Significant career development opportunities for the right individuals.
- OUTSIDE IR35 Contract- Functional tester- SC clearance Microsoft Windows Server
- Outside IR35 contract
Front End Functional tester with SC clearance needed for an Outside IR35 project. Current valid SC clearance is required Experience with functional testing with exchange, sharepoint, SQL and other applications relating across a windows server Migration to 2019. Must be able to get to Central London 3 days a week. Jira, Wiki documentation and automation experience highly desirable.
- ForgeRock Consultant- UK
- United Kingdom
- Upto £100,000 plus benefits
ForgeRock Consultant/ Architect is require for niche consultancy who are looking to expand their presence within the UK/European Market Looking for a lead IAM architect, ideally with ForgeRock experience but would consider other vendors, But looking for someone who is able to advice and consultant with Clients but have the implementation background so they can get involved in projects as and when needed. Key duties will be: Provider IAM consultancy to clients, with a focus on ForgeRock Product stack ·Responsible for the design and implementation of ForgeRock solutions ·Install and configure ForgeRock stack to meet customer authentication and authorization requirements, ·Design and implement OAuth2 protocol using ForgeRock OpenAM, ·Design and develop OpenAM custom authentication modules, ·Configure ForgeRock stack to protect RESTful API, ·Troubleshoot and support ForgeRock IAM stack. This is a great role to join a niche play as they look to kick of their European expansion