• About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal
The Cyber Express
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    Cyble Threat Landscape Report 2025

    The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis

    Attack Surface Visibility Tops CISO Priorities for 2026

    Attack Surface Visibility Tops CISO Infrastructure Security Priorities for 2026

    CIRO cybersecurity incident

    Canada’s Investment Regulator Investigates Cyber Incident, Data Exposure Confirmed

    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: Leadership Changes, Blackouts, Malware, and AI Safety Actions

    Germany

    Germany and Israel Deepen Cybersecurity Ties With New Security Pact

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    Poland cyberattack

    Cyberattack Hits Poland’s Power System, But Blackout Prevented

    Anchorage Police Department Cybersecurity Incident

    APD Investigates Third-Party Cybersecurity Incident, Says No Evidence of Data Compromise

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
  • MagazineDownload
  • Firewall Daily
    • All
    • Bug Bounty & Rewards
    • Dark Web News
    • Data Breach News
    • Hacker News
    • Ransomware News
    • Vulnerabilities
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    Cyble Threat Landscape Report 2025

    The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis

    Attack Surface Visibility Tops CISO Priorities for 2026

    Attack Surface Visibility Tops CISO Infrastructure Security Priorities for 2026

    CIRO cybersecurity incident

    Canada’s Investment Regulator Investigates Cyber Incident, Data Exposure Confirmed

    The Cyber Express Weekly Roundup

    The Cyber Express Weekly Roundup: Leadership Changes, Blackouts, Malware, and AI Safety Actions

    Germany

    Germany and Israel Deepen Cybersecurity Ties With New Security Pact

    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    Poland cyberattack

    Cyberattack Hits Poland’s Power System, But Blackout Prevented

    Anchorage Police Department Cybersecurity Incident

    APD Investigates Third-Party Cybersecurity Incident, Says No Evidence of Data Compromise

    Trending Tags

    • blackbyte ransomware
    • Ransomware
    • lapsus$ ransomware
    • Apple
    • Apple vulnerability
  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Grok AI Image Abuse

    Grok Image Abuse Prompts X to Roll Out New Safety Limits

    RedVDS, RedVDS Tool, RedVDS Infrastructure, Microsoft, Fraud, Scam

    Microsoft Crushes Cybercrime Subscription Service Behind $40 Million Fraud Spree

    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    U.S. Senators Push Apple and Google to Review Grok AI

    After EU Probe, U.S. Senators Push Apple and Google to Review Grok AI

    Government Cyber Action Plan

    UK Moves to Close Public Sector Cyber Gaps With Government Cyber Action Plan

    Donald_Trump

    Trump Orders US Exit from Global Cyber and Hybrid Threat Coalitions

    Cyber action plan, UK, cyber threats targeting political candidates

    UK Unveils £210M Cyber Overhaul as Nation Faces “Critically High” Digital Threat

    MongoBleed, MongoDB, CVE-2025-14847

    Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secrets

    DPDP Act Is Reshaping the Cyber Insurance Landscape

    Beyond Compliance: How India’s DPDP Act Is Reshaping the Cyber Insurance Landscape

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
    • All
    • How to
    • What is
    Google Chrome

    How to Remove Saved Passwords From Google Chrome (And Why You Should)

    DPDP Rules, Cyble, DPDP Act, Cyble Vantage

    How Cyble’s Front-Row Vantage Can Help You in Complying to India’s DPDP Act

    Cybersecurity Countries

    The Top 8 Countries Leading the Cyber Defense Race in 2025

    link building

    The Link Building Secrets Your Competitors Don’t Want You to Know

    Supply Chain Attack

    Supply Chain Resilience and Physical Security: Lessons for 2025

    Healthcare cybersecurity trends of 2024

    Healthcare Cybersecurity: 2024 Was Tough, 2025 May Be Better

    CEO's Guide to Take-Down Services

    Shield Your Organization: CEO’s Perspective on Take-Down Services

    Azure sign-in Microsoft

    Microsoft Announces Mandatory MFA for Azure Sign-ins to Bolster Cloud Defenses

    Signal Proxy, Signal, Signal Ban in Russia, Signal Ban in Venezuela, Bypass Signal Ban, How to Activate Signal Proxy, Signal Proxy Server

    How to Set Up Signal Proxy to Help Bypass Censorship in Russia and Venezuela

  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Nicole Ozer appointment

    Nicole Ozer Joins CPPA to Drive Privacy and Digital Security Initiatives

    National Security Agency (NSA) appointment

    NSA Appoints Timothy Kosiba to Oversee Strategy and Cybersecurity Operations

    Shinhan Card data breach

    South Korea’s Shinhan Card Data Breach Affects 192,000 Merchants

    Cyble's Beenu-Recognized-by-ET-Edge-as-an-Impactful-CEO-2025_

    Beenu Arora, CEO & Co-Founder of Cyble, Recognized by ET Edge as an Impactful CEO 2025

    LastPass UK

    Password Manager LastPass Penalized £1.2m by ICO for Security Failures

    Coupang CEO Resigns

    Coupang CEO Resigns After Massive Data Breach Exposes Millions of Users

    Black Friday

    Black Friday Cybersecurity Survival Guide: Protect Yourself from Scams & Attacks

    Cyble and BOCRA Sign MoU

    Cyble and BOCRA Sign MoU to Strengthen Botswana’s National Cybersecurity Framework

    ARC Data Sale

    ARC Data Sale Scandal: Airlines’ Travel Records Used for Warrantless Surveillance

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Cyber News

Africa Faces a Digital Sextortion Crisis as Numbers Surge Across the Continent

Nigeria’s sextortion rings prompted Meta to delete over 63,000 Instagram accounts in 2024. But that may just scratch the surface.

Mihir Bagwe by Mihir Bagwe
July 9, 2025
in Cyber News, Lockbit Ransomware News, Ransomware News, Threat Intelligence News
0
Digital Sextortion, Africa, Africa Threat Landscape, Threat Landscape Africa 2025, Phishing, BEC
915
SHARES
5.1k
VIEWS
Share on LinkedInShare on Twitter

A continent-wide takedown of 63,000 Instagram accounts in Nigeria in mid-2024 has spotlighted one of Africa’s fastest growing cyber threats: digital sextortion.

The figure, disclosed in Meta’s internal reporting and highlighted in INTERPOL’s newly released Africa Cyberthreat Assessment Report 2025, signals an alarming evolution in online crime across the region. No longer the domain of isolated predators, sextortion — where explicit images are used to extort victims — has scaled into a transnational operation, often enabled by criminal networks traditionally known for financial fraud.

INTERPOL now categorizes digital sextortion as a dominant tactic across the continent, second only to phishing scams. And while much of the activity appears to originate in Nigeria and Ghana, countries like Morocco, Egypt, and Mauritania are also experiencing spikes in AI-generated synthetic media used to coerce, blackmail, and financially exploit victims.

“Sextortion is being weaponized not just as an isolated offense, but as a recurring Tactic, Technique, and Procedure (TTP) within traditional scam ecosystems. Some reporting also suggests these networks may overlap with long-standing organized crime groups (OCGs) in West Africa,” the report notes.

Also read: One of the Largest Cybercriminal Operations in West Africa Dismantled

Sextortion Goes Mainstream

The 2025 INTERPOL report shows over 60% of African countries reported a rise in online image-based sexual abuse (OIBSA), with most warning that actual numbers are likely underreported due to stigma. Law enforcement agencies across East and North Africa now consider sextortion a high-priority threat, with victims ranging from teenagers to high-profile professionals.

Organized cybercriminal rings have begun distributing playbooks, tutorials, and even AI tools to streamline sextortion campaigns. According to INTERPOL’s private sector partners, phishing emails are now the primary delivery vector, often paired with deepfake videos or voice clones to enhance believability.

Some of these incidents have turned fatal. In South Africa, a suicide linked to sextortion raised national alarm. In Egypt, a digital support platform received over 250,000 victim appeals in a single year — a figure that investigators say likely represents only a fraction of actual cases.

report-ad-banner

Phishing, Ransomware, and BEC Still Widespread

While digital sextortion may be the most disturbing development, it’s not the only threat overwhelming African systems.

Phishing — primarily through email and mobile channels — remains the most reported cybercrime across the continent. According to Kaspersky, phishing incidents surged by over 2,930% in Zambia and 826% in Angola in 2024 alone. Social media impersonation and mobile-based smishing are fueling the rise, with AI-generated text and audio now used to exploit linguistic and cultural familiarity.

Ransomware has also taken a devastating toll. South Africa, Egypt, and Nigeria were among the most heavily targeted nations in 2024, with attacks disrupting everything from military systems to telecom giants. In one high-profile breach, South Africa’s Department of Defence lost 1.6 terabytes of sensitive data, including presidential contacts, to the LockBit ransomware group.

Ransomware Africa 2024, Ransomware, Africa, Interpol,
Top 20 African countries by number of ransomware threat detections in 2024 (Image source: Interpol)

The Nigerian fintech firm Flutterwave reported $7 million in losses in a single incident last year, illustrating how attackers are increasingly targeting the region’s most digitized financial ecosystems.

Is Business Email Compromise Africa’s Most Profitable Scam?

Business email compromise (BEC) may not make headlines, but it continues to quietly siphon billions.

INTERPOL’s report notes that BEC is one of the most financially damaging threats, particularly in West Africa. Nigeria, Ghana, and Côte d’Ivoire remain major hotspots, with some BEC groups, such as the Black Axe syndicate, evolving into transnational enterprises that deploy everything from phishing kits to social engineering attacks.

In 2024, 19 African countries reported a combined 10,490 cybercrime-related arrests, though INTERPOL estimates only 35% of cybercrimes are ever reported. One Nigerian BEC operator was sentenced in the U.S. after defrauding over 400 victims and stealing $19.6 million through fraudulent real estate transfers.

Infrastructure, Laws, and Coordination Still Catching Up

Despite the sophistication of cybercriminals, many African countries lack the basic infrastructure to fight back. INTERPOL found that:

  • Only 30% of countries have a cybercrime incident reporting system.

  • Just 19% maintain a threat intelligence database.

  • More than 75% say their legal frameworks are inadequate.

  • 95% cite insufficient training and tools for cybercrime investigations.

Fragmented legal systems and outdated cybercrime laws are making prosecution difficult, especially in cross-border cases. While some countries — including Tunisia, Nigeria, and Burkina Faso — have updated their laws, only six African nations have ratified the Budapest Convention, and just 15 are parties to the AU’s Malabo Convention.

AI-Powered Crime, But Not AI-Powered Policing

Perhaps the most troubling gap in the report is the lack of technological parity between attackers and defenders. While criminals use generative AI to scale attacks and create realistic impersonations, 86% of African law enforcement agencies still do not employ AI in their operations.

The rise of Cybercrime-as-a-Service (CaaS) — where everything from phishing kits to bulletproof hosting is sold on illicit platforms — further lowers the barrier for entry, allowing low-skilled threat actors to launch sophisticated campaigns. Deepfakes, spoofed voices, and fake job scams are now standard fare.

Progress, But the Clock Is Ticking

It’s not all bad news. INTERPOL’s Africa Joint Operation against Cybercrime (AFJOC) led to major arrests in 2024 and the dismantling of several ransomware groups, including coordinated actions with AFRIPOL and private cybersecurity firms.

Also read: Major Cybercrime Operation Nets Over 1,000 Arrests Across Africa

More countries are investing in Computer Emergency Response Teams (CERTs), updating cybercrime laws, and forming public-private partnerships. For instance, Nigeria introduced a national cybersecurity levy in 2024 to fund response initiatives.

Still, with estimated financial losses exceeding $3 billion since 2019, the gap between threat actors and national capability remains wide.

The 2025 INTERPOL report makes one thing painfully clear: Africa is now a proving ground for cybercriminal innovation — from deepfake BEC scams to AI-fueled sextortion. The threats are borderless, rapid, and devastating.

And unless enforcement, legislation, and technology rise at the same speed, the continent’s digital transformation risks becoming a high-speed collision with an underprepared defense.

Share this:

  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Reddit (Opens in new window) Reddit
  • Share on X (Opens in new window) X
  • Share on Facebook (Opens in new window) Facebook
  • More
  • Email a link to a friend (Opens in new window) Email
  • Share on WhatsApp (Opens in new window) WhatsApp

Related

Tags: AfricaAfrica Threat LandscapeAfrica Threat Landscape 2025Digital SextortionSextortionThe Cyber ExpressThe Cyber Express News
Previous Post

Ukrainian Government Systems Targeted With Backdoors Hidden in Cloud APIs and Docs

Next Post

U.S. Hit by Hacktivist DDoS Attacks Following Iran Bombings

Next Post
U.S. DDoS attacks follow Iran bombing

U.S. Hit by Hacktivist DDoS Attacks Following Iran Bombings

Threat Landscape Reports 2025

❮ ❯
Cyble-Vision


Follow Us On Google News

Latest Cyber News

Google Chrome
Cyber News

How to Remove Saved Passwords From Google Chrome (And Why You Should)

January 19, 2026
All In One SEO
Cyber News

All In One SEO Plugin Flaw Exposes AI Token to Low-Privilege WordPress Users

January 19, 2026
Cyble Threat Landscape Report 2025
Cyber News

The Year Ransomware Went Fully Decentralized: Cyble’s 2025 Threat Analysis

January 19, 2026
Threat Hunting
Cyber News

Threat Hunting in 2026: Why Proactive Defence Is the Only Way Forward

January 19, 2026

Categories

Web Stories

Do This on Telegram, Your Bank Account Will Become Zero
Do This on Telegram, Your Bank Account Will Become Zero
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
If You Install the iOS 18 Beta, Your iPhone Could Be Hacked
Cricket World Cup Ticketing Systems Under Cybersecurity
Cricket World Cup Ticketing Systems Under Cybersecurity
Cyber Threats and Online Ticket Scams During the NBA Finals
Cyber Threats and Online Ticket Scams During the NBA Finals
Biometric Data Security: Protecting Sensitive Information
Biometric Data Security: Protecting Sensitive Information

About

The Cyber Express

#1 Trending Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

 

Contact

For editorial queries: [email protected]

For marketing and Sales: [email protected]

 

Quick Links

  • About Us
  • Contact Us
  • Editorial Calendar
  • Careers
  • The Cyber Express by Cyble Vulnerability Disclosure Policy
  • Cyble Trust Portal

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
10080 North Wolfe Road, Suite SW3-200, Cupertino, CA, US 95014

 

India Office:

Cyber Express Media Network
HD-021, 4th Floor, C Wing, Building No.4. Nesco IT Park, WE Highway, Goregaon East, Mumbai, Maharashtra, India – 4000063

  • Privacy Statement
  • Terms of Use
  • Write For Us

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

No Result
View All Result
  • Magazine
  • Firewall Daily
  • Essentials
    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Knowledge Hub
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business
    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • Events
    • Conference
    • Webinar
    • Endorsed Events
  • Advisory Board

© 2026 The Cyber Express - Cybersecurity News and Magazine.

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?
-
00:00
00:00

Queue

Update Required Flash plugin
-
00:00
00:00
Do This on Telegram, Your Bank Account Will Become Zero If You Install the iOS 18 Beta, Your iPhone Could Be Hacked Cricket World Cup Ticketing Systems Under Cybersecurity Cyber Threats and Online Ticket Scams During the NBA Finals Biometric Data Security: Protecting Sensitive Information