• Latest
  • Trending
How to detect and remove SoumniBot Malware on Android

Malware breach hits South Africa’s infrastructure reporting model

July 25, 2025
African startups raised $141.7 million in September 2025

African startups raised $141.7 million in September 2025

October 17, 2025
Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

Pre-seed funding round fuels Tunisian startup PAYDAY with $3 million

October 17, 2025
YouTube updates its user interface across all devices

YouTube updates its user interface across all devices

October 17, 2025
Tech companies dominate Interbrand’s 2025 Best Global Brands

Tech companies dominate Interbrand’s 2025 Best Global Brands

October 17, 2025
Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant

Innoson, Nigerian automaker, unveils plan to establish CNG assembly plant

October 16, 2025
Spotify testing ‘SongDNA’ to show everyone behind your songs

Spotify testing ‘SongDNA’ to show everyone behind your songs

October 16, 2025
$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

$395mn submarine cable project, Medusa, begins deployment to link Europe to Africa

October 16, 2025
Chari raises $12M, gets Morocco’s first VC-backed payment license

Chari raises $12M, gets Morocco’s first VC-backed payment license

October 16, 2025
NCBA unveils ConnectPlus to improve businesses in Kenya

NCBA unveils ConnectPlus to improve businesses in Kenya

October 16, 2025
Slack supercharges Slackbot with smarter AI capabilities

Slack supercharges Slackbot with smarter AI capabilities

October 16, 2025
Gemini AI now handles your Google Calendar meeting scheduling

Gemini AI now handles your Google Calendar meeting scheduling

October 16, 2025
Sun King, REA partner to boost access to clean energy

Sun King, REA partner to boost access to clean energy

October 16, 2025
Techpression
Advertisement
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
Friday, October 17, 2025
No Result
View All Result
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Tech TV
    • General News
    • How To
    • Reviews
  • Cryptocurrency
  • Fintech
  • Startups
  • Ai
No Result
View All Result
Techpression
No Result
View All Result
Home Tech News

Malware breach hits South Africa’s infrastructure reporting model

Ladele Joy by Ladele Joy
July 25, 2025
in Tech News
149 2
0
How to detect and remove SoumniBot Malware on Android
467
SHARES
Share on FacebookShare on TwitterWhatsAppTelegram

South Africa’s National Treasury has confirmed a malware intrusion on its Infrastructure Reporting Model (IRM) website, the government’s central system for tracking infrastructure projects.

The attack, discovered on Tuesday, prompted immediate action to isolate the compromised servers and assess the extent of the damage.

The IRM platform is a critical government tool used nationwide to monitor and track infrastructure projects.

The department announced the breach in a statement on Wednesday, noting it is working with Microsoft to investigate potential vulnerabilities.

RelatedPosts

Tech companies dominate Interbrand’s 2025 Best Global Brands

Tech companies dominate Interbrand’s 2025 Best Global Brands

October 17, 2025
Kuwait expands digital skills initiative with Google Cloud

Kuwait expands digital skills initiative with Google Cloud

September 28, 2025

Raya IT secures EGP 1.13bn from IDB to strengthen Egypt’s banking cybersecurity, fintech

September 21, 2025

Microsoft and OpenAI strengthen AI partnership with new agreement

September 15, 2025
Load More

This move comes amid global concerns following recent cyberattacks targeting Microsoft platforms in the United States.

IRM website compromised amid global Microsoft security breach

The IRM platform is a key online tool for monitoring infrastructure development nationwide. National Treasury acted swiftly by isolating the affected servers to prevent further spread and to protect the integrity of its broader Information and Communication Technology (ICT) systems.

“Considering recent media reports since Sunday regarding security incidents affecting Microsoft platforms in the United States, National Treasury has requested Microsoft’s assistance,” the department said.

The attack coincides with a wave of international cyber-espionage campaigns exploiting vulnerabilities in Microsoft server software—raising concerns about the ripple effect on public systems globally, including in South Africa.

Despite the breach, Treasury assured the public that all other systems and websites function normally. No service disruptions have been reported so far.

Cybersecurity measures in place as threat landscape grows

National Treasury’s ICT team is central in defending government digital assets from cyber threats. On average, the department processes over 200,000 emails daily and manages over 400,000 user connections to its platforms.

Its cybersecurity systems detect and block around 5,800 threats, including phishing emails, malware attacks, and spam, every day, highlighting the persistent attempts to compromise government data.

“The department remains committed to safeguarding its digital environment through proactive threat detection and response protocols,” Treasury said.

These preventative measures are increasingly critical as cyberattacks on state institutions continue to rise globally.

The incident is a stark reminder of how even secure platforms can be vulnerable, especially when widely used software like Microsoft’s is under attack.

Microsoft collaboration signals ongoing digital risk management

By bringing Microsoft on board, the National Treasury is taking steps to patch potential weaknesses in its systems and strengthen defences against future threats.

This partnership is particularly relevant given that Microsoft’s infrastructure has been at the centre of recent high-profile breaches.

While investigations are still underway, the department’s rapid containment of the threat and transparency around the incident are encouraging signs of a maturing public-sector cybersecurity strategy.

As digital transformation accelerates across South Africa, the need for robust cyber resilience has never been clearer.

The malware incident on the IRM website underscores the vulnerability of critical systems and highlights the urgency of continuous vigilance, collaboration, and investment in national cybersecurity infrastructure.

Tags: cybersecurityInfrastructure Reporting ModelIRM WebsiteMalware IntrusionMicrosoftNational Treasury
Ladele Joy

Ladele Joy

Ladele Joy is a content writer and tech reporter specializing in entertainment and gaming. She crafts engaging stories that connect with readers. Joy brings curiosity and creativity to every piece she writes.

Quick Links

  • Tech News
  • Cryptocurrency
  • Fintech
  • Startups
  • Business
  • Home
  • About
  • Contact Us
  • Advert Rate
  • Terms & Conditions
  • Privacy Policy
  • SiteMap

© 2025 Techpression

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

We are using cookies to give you the best experience on our website.

You can find out more about which cookies we are using or switch them off in .

No Result
View All Result
  • Home
  • Tech News
    • Africa Tech
    • Global Tech
    • Tech with Pelumy
    • Tech Careers
    • Reviews
    • How To
    • General News
  • Cryptocurrency
  • Business
  • Fintech
  • Startups
  • Featured
  • Ai
  • Tech TV

© 2025 Techpression

techpression.com
Powered by  GDPR Cookie Compliance
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

Strictly Necessary Cookies

Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.

3rd Party Cookies

This website uses Google Analytics to collect anonymous information such as the number of visitors to the site, and the most popular pages.

Keeping this cookie enabled helps us to improve our website.