June 12, 2021

AradaLay

WASH. COVER. AVOID. DISTANCE. ISOLATE

Precautions to be taken! – Ethiopia

2 min read
Precautions to be taken in our country to avoid attacks by Egyptian cybercriminals. Over the years, various hackers from Egypt have hacked into the database of governmental and non-governmental organizations in our country in an effort to gain access to information and to disrupt internet services. It is our recent memory that they threatened to launch a major cyber-attack on Ethiopian government and public organizations, especially if the Renaissance Dam is not reached, and failed.
Precautions to be taken!

Precautions to be taken!

Precautions to be taken in our country to avoid attacks by Egyptian cybercriminals.
Over the years, various hackers from Egypt have hacked into the database of governmental and non-governmental organizations in our country in an effort to gain access to information and to disrupt internet services.
It is our recent memory that they threatened to launch a major cyber-attack on Ethiopian government and public organizations, especially if the Renaissance Dam is not reached, and failed.

The Egyptian cyber group, which calls itself Cyber ​​Horus Group, is involved in cyber-attacks against Ethiopia.
Last June, the same Egyptian thug group launched a cyber-attack on at least 13 offices affiliated with the Ethiopian government. Al-Sisi’s government has not yet officially claimed responsibility, although the Egyptian government is suspected of being behind the attack.

The cyber-attack hacked into hacked or hacked databases and tarnished the name or logo of the internet, claiming that we are the children of Pharaoh who took a drop from the waters of the Nile. Fortunately, the people have nothing to do with gossip!


.
Egyptian cyber-attackers are said to be carrying out cyber-attacks and attacks in rival countries such as Iran, Libya, Turkey and Qatar.
Egyptian government: No legal action against these hackers does not require a prophet to assume that he is behind the act.

Precautions to be taken in our country to avoid attacks by Egyptian cybercriminals.
Over the years, various hackers from Egypt have hacked into the database of governmental and non-governmental organizations in our country in an effort to gain access to information and to disrupt internet services.
It is our recent memory that they threatened to launch a major cyber-attack on Ethiopian government and public organizations, especially if the Renaissance Dam is not reached, and failed.

International social media companies have been warning the Egyptian government since April that it has been working to destabilize neighboring countries by cracking down on cyber policies.

Twitter has shut down accounts linked to the state-run Elfager newspaper.
Facebook has shut down a number of Egyptian accounts targeting the Ethiopian Renaissance Dam, although it has refrained from directly blaming the Egyptian government, such as Twitter.
Egypt is shocked by plans to build a fiber-optic cable that will connect Saudi Arabia to Israel via Egypt.

Probably a factor as to why they’re doing so poorly: Google is pushing for more fiber optics to expand its database and expand its database.
According to Insa, the following are the following attempts by Egyptian hackers to hack into the Ethiopian Internet.

  1. Cyber ​​Horse Hacks Group is based in Egypt
  2. Anubis Hacker Group
    ET-HUNTER also engaged in hacking and hacking of the same network outside of the above-mentioned group Insa.
    If Insa had not taken immediate remedial action on the Internet, it would have caused serious damage to our economy and other infrastructure.

Summary
As Insa has previously stated, any governmental or non-governmental organization or organization needs to learn from cyber-attacks and strengthen its cyber security system.

While INSA protection alone cannot stop all attacks, the damage will be negligible if every agency or organization takes the necessary precautions.
Taking the following precautions will not only save you from hacker attacks but also reduce or eliminate potential losses to the country.

  1. Provide regular briefings to your school staff on current hacking programs and keep them alert.
  2. Change any existing default password or secret keys regularly and encourage users to use the new strong password secretly and carefully. Keep a close eye on unscrupulous workers as they expose hackers.
  3. If the IT port is open, close it and install the necessary anti-virus and firewall. A firewall or firewall will prevent hackers from hacking into your information. In particular, state agencies and some federal agencies do not regularly install and update up-to-date anti-virus software, as if anti-virus software had been installed on a computer network for years, causing significant damage to data and hardware.
  4. System Inspection
    Any key national security agency or other organization is required to verify that the office is free of hacker attacks. Anti-hacker “hackers.” Apply to be free from harassment and close the loophole. It is said that a thief does not steal, so it is safe for foreign hackers to infiltrate and infiltrate harmful hackers.
    “Those who always anticipate accidents never have them.” In our interpretation, it means that people who are always on the lookout for danger and who are cautious will not be harmed. For example, I do not always drive more than 80 kilometers per hour, and if the front tire flies or blows, the driver who is driving slowly will probably die in an accident. A driver who sprints up to 150 km / h, which is slower, is less likely to survive in the event of an accident. So my dear countrymen, be careful. Be vigilant about your school and your home country as it is said to have been unintentionally hacked.
    May the Creator help our country overcome the internal and external challenges and challenges it faces. We are on the side of our country
    We must stand up and work hard to reduce our suffering!
    .
    Suleiman Abdalla

1 thought on “Precautions to be taken! – Ethiopia

Leave a Reply

Your email address will not be published. Required fields are marked *