Multiple Government Websites Taken Offline in Widespread Cyberattack

0
57
Photo Courtesy

Several government websites were knocked offline on Monday morning following a coordinated cyberattack that disrupted digital services across multiple ministries.

Visitors trying to access the affected platforms were met with disturbing messages such as “Access denied by PCP,” “We will rise again,” “White power worldwide,” and “14:88 Heil Hitler.” No group has stepped forward to claim responsibility for the breach.

Authorities say efforts are underway to restore the compromised systems. Public officials have been cautioned against logging into the affected platforms and urged to report any unusual online activity.

In an alert sent out early Monday, the ICT Authority confirmed the incident:
“Good morning, colleagues. Please note that we have detected a security breach affecting some government websites. Our cybersecurity team is working to contain the incident together with our stakeholders.”

The notice further advised staff to avoid the compromised sites and report suspicious activity to the designated security emails: Infosec@icta.go.ke, noc@icta.go.ke, and websupport@icta.go.ke. More updates, the agency said, would be shared as the situation unfolds.

A wide range of departments were affected, including the Ministries of Interior, Health, Education, Energy, Labour, and Water, along with the Gambling Regulatory Authority. Other targeted platforms included those belonging to the Immigration Department, the Directorate of Public-Private Partnerships, the Directorate of Criminal Investigations (DCI), the State House website, Hustler Fund, Government Press, and Nairobi County.

On one of the breached sites, the attackers listed a location: pcp@Kenya $ Flat#6, 28 Victoria Park Road, Leicester.

Cyberattacks refer to attempts by malicious actors to infiltrate, damage, or disable digital systems—whether belonging to individuals, corporations, or governments. Such attacks may aim to steal or manipulate data, disrupt services, or penetrate networks for financial gain, espionage, or sabotage.

LEAVE A REPLY

Please enter your comment!
Please enter your name here