Cyber Attack On Kenya’s Ministry – Critical Documents At Stake

There is a cyber-attack on Kenya’s foreign ministry servers by the hacking collective Anonymous and a large cache of data have been stolen, cyber security website reports.

HackRead says the attack was carried out under the banner of OpAfrica – an operation introduced last year to root out child abuse, child labour and corruption in the African countries.

Kenyan government is yet to release a statement to confirm whether or not there has been a data breach.

HackRead also reports that some of the 1TB of data stolen has been leaked on the “dark web,” a collection of websites that are concealed and greatly encrypted, to safeguard their owners and users.


Recently, Anonymous reportedly hacked the websites of some state-owned establishments including a Kenyan oil refinery.

The rise in threats of cyber-attack in the country has grown alarmingly. In 2015 alone, statistics show that 30 firms suffered cyber-attack daily in Kenya.

Read Also: Cyber Crime: Taiwan Accuses China Of Abudcting 8 Taiwanese From Kenya

The cyber-crime which weighs on economies often involve defacing websites, instead of stealing data. But as governments and more companies embrace technology and online presence, there is now more material available to these hackers.

Last year, companies lost a whooping Sh15 billion, three times higher than the Sh5 billion that went the hackers’ way the previous year. The government has been battling those involved in Cyber-crimes with some Chinese detained and repatriated in order to be charged further in their home country.

Anonymous works just like organizations or companies do. And since there are hackers in various countries who use the name too, it is not easy to determine if the hackers are from Kenya or abroad.

This is because the criminals are adept at covering their tracks, making it impossible to pin them. The hackers who are interested in getting critical documents or cash make sure they have uncontested control of internal IT systems of a company before logging in.

They quietly process transactions and then delete off every proof.

These hackers, however, claim that they are activists warring against corruption and injustice.