Cybersecurity Risks and Threats

Kenya continues to face the following cybersecurity risks and threats;

  • Cyber warfare.  Cyber criminals, both state and non-state actors attack computer network systems with the intention of disrupting, damaging, and/or destroying infrastructure through computer viruses or denial-of-service attacks.
  • Cyber Espionage. Cyber criminals in the cyber domain are using various means such as phishing to gain unauthorized access into government and organizational computer systems and networks in order to extract and exfiltrate valuable, critical and sensitive information/data for political agendas, competitive advantage or financial gain.
  • Sabotage. Critical Infrastructure, computer systems and networks that support essential day-to-day operations are constantly being interfered with by cyber criminals with the intent to cause them to fail thus denying, hindering or disrupting vital services and operations.
  • Cyber terrorism. Cyber criminals continue to conduct online radicalization of Kenyan youth and carry out targeted cyber-attacks against critical information infrastructure with the end goal being to achieve economic, political or ideological gain.
  • Subversion. Cyber threat actors are deliberately distributing fake and unverified information via the internet in order to manipulate public opinion and undermine institutional stability, authority, efficiency and effectiveness.
  • Cyber Extortion.  Cyber criminals continue to leverage on various tactics such as using malware to hijack critical computer systems and networks in order to demand a ransom. Such actors also blackmail internet users by threatening to disclose sensitive or personal information unless certain demands are met.
  • Organized Cybercrime. Organized cyber criminals including online scammers and fraudsters continue to conduct crimes through electronic fraud, identity theft to exfiltrate sensitive data/information for malicious purposes.
  • Online impersonation. Cyber criminals pretend to be someone else by assuming a person’s identity in order to access their personal social media accounts, bank accounts, personal and work mail. Such criminals also use a forged version of a genuine website to lure online users into visiting fraudulent websites.
  • Cyber bullying / harassment. Malicious internet users leverage digital platforms including social media, messaging platforms, gaming platforms and other digital technologies to harass, threaten or target other internet users.