South African Power Firm Eskom Fails To Secure Customer Data

A safety researcher resorted to a public tweet approximately an extreme information breach regarding patron facts after a South African electricity provider ignored all different pleas to remedy the leak. Security researcher Devin Stokes issued the general public tweet to Eskom, South Africa’s state-owned energy corporation. The fact that Eskom, which substances 95 percentage of the electricity to South Africa and indeed different African nations, did now not respond to the safety researcher’s pleas will come as little marvel to folks that recognize the firm or have dealt with it.

Eskom leak

“You don’t respond to numerous disclosure emails, email from journalistic entities, or Twitter DMs, but how approximately a public tweet?” tweeted Devin Stokes in desperation. “This is going on for weeks right here. You want to cast off this information from the public view! You are unnecessarily exposing YOUR customer’s statistics! Stokes then posted a screenshot of a purchaser document in a live database, which showed the person’s complete call and credit score card CVV. After that, public shaming

At least one media outlet did manage to get a few forms of acknowledgment about the facts to breach from Eskom. However, the electricity company displayed a normally dismissive attitude to the leak. When queried about the leak with the aid of the broadband. Co. Za website, Eskom said that its institution IT branch changed into conducting investigations to determine whether sensitive Eskom statistics turned into compromise. We will remark completely as soon as the research is concluded,” Eskom reportedly stated.

Expert take

This negative response from the company brought on a sharp reaction from safety researchers. An organization of the dimensions of Eskom cannot compromise on its security posture,” said Paul Edon, senior director at Tripwire. “The reality that a third-party safety researcher had to flag the records publicly leak to Eskom’s CEO on Twitter reveals a much wider problem in their usual method to statistics protection that unluckily a few agencies nonetheless have. There is a bent for boardroom executives to function with a reactive attitude

Even though comprehensible, because assaults are tough to visualize till they show up, it’s far still unacceptable,” stated Edon. A database of personal records is always an appealing goal to cybercriminals, specifically because the information uncovered in the Eskom assault appears to include banking and credit score card records, which have turn out to be a high commodity without problems sold at the darkish web,” he brought.

“It isn’t too past due for the South African power company to patch its vulnerabilities and secure its customers’ privateness. However, Eskom will need to adopt an extra proactive method to protection transferring forward, which must involve actively monitoring cybersecurity flaws and susceptible access points,” said Edon. “Only with the aid of understanding your machine will you be capable of saving you and reply timely to threats.”


I’m a technophile who loves everything about technology. I enjoy learning new things about new gadgets and technologies. I started Droidific because I wanted to share what I was learning with other people who love gadgets, new technology, and all the different ways they can be useful.