A growing cyber threat landscape of East Africa – part 2

As the global digital landscape continues to expand, so too do the risks associated with it. The East African (EA) region, while making notable progress in digital transformation, still lags significantly behind more advanced regions like the United Arab Emirates (UAE) in terms of digital infrastructure, cybersecurity readiness, and exposure management.

The East African Region in Context

The East African region has approximately 13,409 discovered systems and applications, a figure dramatically lower than the UAE’s 155,000. This disparity highlights the contrasting stages of digital maturity between the regions. The UAE has aggressively invested in smart city projects, e-government services, and a dynamic digital economy, creating an extensive and complex web of digital infrastructure. However, this advancement comes at a cost—broadening the nation’s attack surface and increasing its susceptibility to cyber threats.

Conversely, East Africa is still in the early to middle stages of digital transformation. While Kenya has shown promising growth in its tech ecosystem, countries like Rwanda and Uganda still maintain relatively smaller digital footprints. Uganda, for instance, has recognized the urgency of this challenge by launching a National Cybersecurity Strategy, aimed at fostering a secure and trusted digital economy.

Still, as the digital footprint across East Africa grows, so does its vulnerability. Without significant investments in cybersecurity infrastructure, policies, and talent mirroring models like the UAE, EA countries risk exposing critical systems to increasingly sophisticated cyber threats.

Deep Dive into Uganda’s Cybersecurity Posture

Digital automation has become a top priority in the boardrooms of Uganda’s major sectors, including financial services, telecommunications, utilities, and government. While this shift offers vast benefits in service delivery and efficiency, it also introduces new cybersecurity risks.

A glaring example was the October 2020 cyber breach. Cybercriminals exploited approximately 2,000 mobile SIM cards to compromise Uganda’s mobile money infrastructure. The incident impacted companies like Pegasus TechnologiesMTN UgandaAirtel Uganda, and Bank of Africa, resulting in an estimated loss of UGX 11 billion. This breach laid bare systemic weaknesses in Uganda’s cybersecurity posture, especially in the management of digital payment systems.

Further assessments have identified a host of vulnerabilities within Uganda’s digital environment. Weak cryptographic implementations, unsecured open ports, outdated systems, and poorly configured network access points continue to pose significant threats, particularly to sectors that manage sensitive data.

Exposure Through Open Ports: Uganda’s Top Vulnerabilities

An in-depth analysis of Uganda’s exposed systems revealed 19 critical open ports, many of which are potential entry points for attackers. The table below summarizes key ports and their associated risks:

Table 1: Open ports discovered in Uganda and services running.

Port Description Security threat
80 (HTTP) Port 80 is an insecure protocol. Data is sent in plain text. Hypertext Transfer Protocol (HTTP) runs on port 80 and is used for transmitting web traffic.

 

From July 2017 to August 2024, we observed an average of 4,837 systems and instances where port 80 was open across all internet service providers.

Port 80 is vulnerable to man-in-the-middle attacks, eavesdropping, and data interception because data is sent in plain text i.e., not encrypted.  Such poor cybersecurity practices are responsible for the growing number of business email compromises.

 

For secure website browsing, websites should ideally use HTTPS (Port 443) instead.

22 (SSH) Port 22 provides encrypted communication for remote login and command execution.

 

We observed an average of 4,186 systems and instances where port 22 was open between July 2017 and August 2024.

If misconfigured, port 22 could be targeted for brute-force attacks to gain unauthorized access to information technology systems.
161 (SNMP) Port 161 is used for network management and monitoring devices. It uses the Simple Network Management Protocol. In the period between July 2017 and August 2024, there was an average of 4,027 systems where port 161 was open and running across all internet service providers. Exposed SNMP could reveal sensitive information about the network infrastructure, leading to the exploitation of vulnerabilities.
443 (HTTPS) Port 443 is a secure web traffic communication protocol. Unlike port 80, Port 443 uses the Hypertext Transfer Protocol Secure, which encrypts web traffic, securing data between the user and the web server.

Our analysis shows that most internet service providers are lagging in terms of securing client data over the web. On average, 3,356 systems had port 443 active from the data analysed between July 2017 and August 2024, while port 80 had an average of 4,837.

Critical for protecting user data. Misconfigured SSL/TLS certificates could still expose websites to attacks.
Port 53

(DNS)

Port 53 runs the Domain Name System that translates domain names into IP addresses. For any website, it must have an Internet Protocol (IP) address.

 

We observed that from July 2017 to September 2017, no systems and instances were running on port 53.  Traffic picked up from October 2017.

 

Analysis shows that 1,253 systems and instances were open on port 53. The average is low due to the Uganda Communications Commission regulatory requirement where all domain owners were mandated to register with UCC.

If misconfigured, attackers could use port 53 to cause denial of service on websites.
Port 23 (Telnet) Telnet is a widely used tool that provides remote login services. Telnet, just like port 80 transmits data, including credentials, in plain text. Our analysis shows that NITA-U had the highest number of open Telnet ports.  On average, 1,240 systems had Telnet open from July 2017 to August 2024. Extremely insecure and prone to eavesdropping attacks. It is generally replaced by SSH (Port 22).
Port 21 (FTP) Port 21 is used to transfer files over the network. It uses the File Transfer Protocol mechanisms. Transmits data in plain text, including passwords. It’s prone to attacks like FTP bounce, packet sniffing, and brute force.
The Critical Role of Cryptographic Design

At the heart of any secure system lies modern cryptography—responsible for ensuring data confidentiality and verifying the authenticity of users and machines. Unfortunately, many systems in Uganda still transmit sensitive information in clear text, essentially sending critical data across the internet like an unsealed letter.

When open ports are not secured with robust cryptographic protocols, attackers can easily eavesdrop, intercept, and manipulate traffic. For example:

  • Port 80 without HTTPS exposes user credentials.

  • FTP and Telnet transmit passwords in plain text.

  • Improper SSL/TLS configurations leave even encrypted systems vulnerable.

A secure digital ecosystem demands the implementation of modern cryptographic standards, such as:

  • SSL/TLS for all web-based communication.

  • SSH for encrypted remote server access.

  • Regular key rotation and certificate validation to prevent impersonation attacks

Real-World Impact: Frontline assessments indicate that plaintext data flows are a leading cause of credential theft, financial fraud, and data manipulation in Uganda’s public and private sectors.

Looking Ahead: Strengthening Uganda’s Cyber Defenses

Uganda’s digital growth is accelerating, but this progress must be matched by proportional cybersecurity investments. Policymakers and private sector leaders alike have a role to play. Strategic priorities should include:

  • Mandatory encryption for all public-facing systems.

  • Regular penetration testing and vulnerability assessments.

  • Strengthening cyber regulations and ensuring compliance.

  • Raising awareness and building capacity within technical teams.

In cybersecurity, you are only as strong as your weakest link. With the growing number of exposed systems and poor cryptographic practices, the time to act is now. Waiting until after the next breach will only compound the cost, financially and reputationally.

The cyber landscape in East Africa, particularly Uganda, is at a critical juncture. While digital growth brings opportunity, it also widens the attack surface. Lessons from advanced digital economies like the UAE underscore the importance of pairing innovation with strong cybersecurity frameworks. As Uganda continues its digital journey, closing the gaps in encryption, port security, and network hygiene will be essential in building long-term resilience and trust

This article draws on key findings from The iShield Project’s Frontline Report 2024, offering a snapshot of the region’s evolving cybersecurity landscape. For deeper insights, case studies, and recommendations: Download the PDF here.

 

 

 

Previous Post

About Company

At the Institute of Forensics & ICT Security (IFIS), we specialize in bridging the gap between knowledge and application.

Most Recent Posts

  • All Posts
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

Category

Tags

You have been successfully Subscribed! Ops! Something went wrong, please try again.

About Us

 we specialize in bridging the gap between knowledge and application.

Recent news

  • All Post
  • Blog
  • Career Management
  • Computer Security
  • Cyber Defence
  • Cyber Incidence Response
  • Cyber Preparedness
  • Cyber Security
  • Data Privacy
  • Endpoint Security
  • Fraud Investigation and Examination
  • Fraud Management
  • IT Security Audit
  • Marketing
  • Mobile Security
  • Training
  • UX/UI Design
  • Web Development

© 2025 All rights reserved Institute of Forensics and ICT Security | IFIS is the training arm of Summit Consulting Ltd