• Latest
  • Trending
How to detect and remove SoumniBot Malware on Android

Malware breach hits South Africa’s infrastructure reporting model

July 25, 2025
Jiji’s expansion in Africa: Anton Volianskyi on scaling, trust, and the future of e-commerce

Jiji’s expansion in Africa: Anton Volianskyi on scaling, trust, and the future of e-commerce

September 26, 2025
Healthcare Innovation Summit Africa 2025 returns to Johannesburg with focus on digital transformation

Healthcare Innovation Summit Africa 2025 returns to Johannesburg with focus on digital transformation

September 26, 2025
Pearl Nkrumah becomes the first female MD of Access Bank Ghana

Pearl Nkrumah becomes the first female MD of Access Bank Ghana

September 26, 2025
Verto opens new strategic hub in Nairobi to simplify global trade for emerging markets

Verto opens new strategic hub in Nairobi to simplify global trade for emerging markets

September 26, 2025
Revolut seeks South African banking license

Revolut seeks South African banking license

September 26, 2025
Nokia, Nscale partner to facilitate the deployment of AI infrastructure

Nokia, Nscale partner to facilitate the deployment of AI infrastructure

September 26, 2025
PayPal commits $100 million to boost digital economy in Middle East and Africa

PayPal commits $100 million to boost digital economy in Middle East and Africa

September 26, 2025
Mastercard, Smile ID partner to launch fraud-prevention digital identity solutions

Mastercard, Smile ID partner to launch fraud-prevention digital identity solutions

September 26, 2025
Google combines Android and ChromeOS for a new PC system

Google combines Android and ChromeOS for a new PC system

September 26, 2025
Orange Egypt partners with mnGm to introduce gold trading via mobile wallets

Orange Egypt partners with mnGm to introduce gold trading via mobile wallets

September 26, 2025
Your one-stop tech hub! Get the latest updates on AI, cybersecurity, fintech, and emerging technologies.
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Tech News

Malware breach hits South Africa’s infrastructure reporting model

Ladele Joy by Ladele Joy
July 25, 2025
149 2
0
How to detect and remove SoumniBot Malware on Android
467
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

South Africa’s National Treasury has confirmed a malware intrusion on its Infrastructure Reporting Model (IRM) website, the government’s central system for tracking infrastructure projects.

The attack, discovered on Tuesday, prompted immediate action to isolate the compromised servers and assess the extent of the damage.

The IRM platform is a critical government tool used nationwide to monitor and track infrastructure projects.

The department announced the breach in a statement on Wednesday, noting it is working with Microsoft to investigate potential vulnerabilities.

RelatedPosts

Raya IT secures EGP 1.13bn from IDB to strengthen Egypt’s banking cybersecurity, fintech

Microsoft and OpenAI strengthen AI partnership with new agreement

Kenya’s banking sector loses Sh1.59 billion to hackers in 2024

This move comes amid global concerns following recent cyberattacks targeting Microsoft platforms in the United States.

IRM website compromised amid global Microsoft security breach

The IRM platform is a key online tool for monitoring infrastructure development nationwide. National Treasury acted swiftly by isolating the affected servers to prevent further spread and to protect the integrity of its broader Information and Communication Technology (ICT) systems.

“Considering recent media reports since Sunday regarding security incidents affecting Microsoft platforms in the United States, National Treasury has requested Microsoft’s assistance,” the department said.

The attack coincides with a wave of international cyber-espionage campaigns exploiting vulnerabilities in Microsoft server software—raising concerns about the ripple effect on public systems globally, including in South Africa.

Despite the breach, Treasury assured the public that all other systems and websites function normally. No service disruptions have been reported so far.

Cybersecurity measures in place as threat landscape grows

National Treasury’s ICT team is central in defending government digital assets from cyber threats. On average, the department processes over 200,000 emails daily and manages over 400,000 user connections to its platforms.

Its cybersecurity systems detect and block around 5,800 threats, including phishing emails, malware attacks, and spam, every day, highlighting the persistent attempts to compromise government data.

“The department remains committed to safeguarding its digital environment through proactive threat detection and response protocols,” Treasury said.

These preventative measures are increasingly critical as cyberattacks on state institutions continue to rise globally.

The incident is a stark reminder of how even secure platforms can be vulnerable, especially when widely used software like Microsoft’s is under attack.

Microsoft collaboration signals ongoing digital risk management

By bringing Microsoft on board, the National Treasury is taking steps to patch potential weaknesses in its systems and strengthen defences against future threats.

This partnership is particularly relevant given that Microsoft’s infrastructure has been at the centre of recent high-profile breaches.

While investigations are still underway, the department’s rapid containment of the threat and transparency around the incident are encouraging signs of a maturing public-sector cybersecurity strategy.

As digital transformation accelerates across South Africa, the need for robust cyber resilience has never been clearer.

The malware incident on the IRM website underscores the vulnerability of critical systems and highlights the urgency of continuous vigilance, collaboration, and investment in national cybersecurity infrastructure.

Tags: cybersecurityInfrastructure Reporting ModelIRM WebsiteMalware IntrusionMicrosoftNational Treasury
Ladele Joy

Ladele Joy

Ladele Joy is a content writer and tech reporter specializing in entertainment and gaming. She crafts engaging stories that connect with readers. Joy brings curiosity and creativity to every piece she writes.

No Result
View All Result

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business

Follow Us:

  • facebook
  • instagram
  • Twitter(X)
  • Linkedin
  • YouTube
  • About
  • Advertise
  • Privacy & Policy
  • Contact

© 2025 Techpression.com -Techpression Media Limited

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression.com -Techpression Media Limited

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.