NCSA discuss major cyber threats, mitigation strategies
Friday, November 03, 2023
Officials during the ongoing Tekana Online campaign aimed to educate them about Rwanda's Personal Data Protection and Privacy law and promote responsible online behaviour. Photo by Emmanuel Dushimimana

Cyber threats are on the rise worldwide, becoming progressively more sophisticated and challenging to counter.

According to a recent report by Check Point, a global cyber security solutions firm, weekly cyber-attacks have increased by 7 per cent in quarter 1 of 2023 compared to the same period last year, with each firm facing an average of 1248 attacks per week.

While the rapid advancement of ICT in Rwanda holds promise for the nation's economic growth, it also introduces a significant challenge as cyber threats continue to evolve globally.

ALSO READ: Why cyber security is critical today more than ever

In an interview with The New Times, Amos Kamugabirwe, the Chief Technology Officer at the National Cyber Security Authority (NCSA), shed light on major cyber threats and discussed strategies for their mitigation.

1. Phishing

Kamugabirwe said the most pertinent cyber threat to everyday users of the internet is phishing, which involves scammers or attackers using deceptive methods to send links or messages, often using enticing offers such as lottery wins, free visas, job opportunities, or fake banking alerts to lure potential victims.

"These messages are sent to as many people as possible, with the aim of tricking them into clicking the links without due consideration,” he said.

"Once someone clicks on these links, they are taken to a webpage that may resemble their bank's official site or another legitimate source. Victims are then prompted to enter their personal information, such as their name and password. After submitting this information, the page may appear to malfunction, but in reality, the attackers have successfully collected the victim's data.”

ALSO READ: Musanze residents mobilised on online safety, personal data privacy

According to Kamugabirwe, phishing attacks can take various forms, including email messages, text messages, or even links shared in messaging apps like WhatsApp.

In some cases, clicking on a malicious link can lead to the attacker gaining access to the victim's contacts, potentially spreading the attack further, said the expert.

ALSO READ: Email-related fraud increasingly targeting Rwanda

Kamugabirwe also emphasised some challenges in preventing phishing attacks as they often take advantage of the user’s ignorance to do due diligence since appear as seemingly legitimate links or messages. Additionally, many security measures may hardly detect these threats as they are often let through by targeted users as legitimate information until the user clicks on them.

He said that the most effective way to protect oneself from such phishing threats is to be cautious and aware and to always apply the fact of "think before click”.

"Users should carefully examine any message or link before clicking... and they should never provide sensitive information like usernames and passwords to unsolicited requests, even if they appear to be from trusted sources,” he advised.

ALSO READ: Nyabugogo residents mobilised on phishing, other cyber frauds

2. Malware

Malware, which stands for "malicious software,” is a harmful file or code that is usually sent over a network. It can infect, investigate, steal, or carry out various actions as directed by an attacker. Since there are many different types of malware, there are many ways it can infiltrate computer systems.

Kamugabirwe said that there have been cases of malicious programs infecting people's computers when users click on unknown links or advertisements, often without their knowledge.

ALSO READ: Ever wondered what cybersecurity has got to do with you?

He explained how keyloggers (tools that can record what one types into a computer or mobile keyboard) are used to record keystrokes, including sensitive information like passwords and usernames, adding that the malwares are spread through popular websites that users frequently visit, such as sports, commercial, and advertising sites.

He emphasized the importance of using updated antivirus software as a preventive measure, as antivirus programs can detect and stop the threats.

"Many people underestimate the significance of antivirus protection, leading them to become victims of malware attacks,” he said, adding that malware can compromise online accounts, impersonate users, and use people’s accounts to request money from others.

He urged individuals to remain cautious and informed about the threats to safeguard their online security.

3. Ransomware

According to Kamugabirwe, ransomware involves attackers sending disguised links mostly in targeted phishing attacks.

"Clicking on these links can lead to the automatic installation of malicious software, which encrypts computer files and blocks access. These attackers then demand a ransom for decryption,” he explained.

The expert also mentioned that ransomware often comes through email attachments and is a common method used by malicious actors to make quick money.

He highlighted the danger of the threat spreading through networks, which he said can affect entire institutions or even a country if on a shared network.

He urged individuals to be cautious with unsolicited links and to seek assistance from IT experts when in doubt.

4. Web defacement

Kamugabirwe explained that web defacement is also another common cyber-attack which involves attackers taking control of a website, replacing its content with their own, and potentially promoting their agenda or shaming contents.

The risk of attackers gaining access to an admin's credentials through methods like sending viruses or targeting normal users to obtain admin contact information.

"This activity is typically not motivated by money but aims to damage the institution's or country’s reputation, promoting hacktivists’ agenda or advertising their products” he said.

To counter such threats, Kamugabirwe suggested implementing network access security measures, such as strict access controls tools for content managers, website administrators, use of strong passwords and double layered authentication and limiting access to specific internal networks.