Cyber Attacks in Kenya: A Three-Month Threat Landscape Review (Oct–Dec 2025)

  • Last Created On Jan 28, 2026
  • 239
0 0

Cybersecurity threats in Kenya have reached unprecedented levels. According to data released by the National KE-CIRT/CC, the country recorded over 4.5 billion cyber threat events in just three monthsβ€”between October and December 2025. This represents a 441.27% increase compared to the previous quarter, signaling a rapidly escalating cyber risk environment affecting government institutions, businesses, and individual users alike.

This article examines the current cyber attack trends in Kenya, the most prevalent attack vectors, and the key drivers behind this surge, based on official national data and observed threat patterns.

Overview of Cyber Threat Activity in Kenya

Between October and December 2025, KE-CIRT/CC detected a total of:

4,559,229,985 Cyber Threat Events

This explosive growth highlights:

Increased exploitation of vulnerable systems

Poor patch management

Low user awareness of phishing and social engineering

Rising use of AI-driven attack tools by threat actors



Cyber Threat Landscape – Total Cyber Threats Detected

Breakdown of Cyber Attacks by Vector

1. System Attacks – 4.37 Billion Events

System-level attacks dominated Kenya’s threat landscape, accounting for over 95% of all detected events.

Key causes include:

Unpatched operating systems

Misconfigured servers and network devices

Continued reliance on deprecated systems

Weak access control policies

These attacks primarily target government systems, ISPs, financial institutions, and large enterprises.

2. Malware Attacks – 70.9 Million Events

Malware remains a major threat, driven by:

Trojans and botnet infections

Email-borne malware

Compromised websites distributing malicious payloads

Many infections originate from phishing campaigns and cybercrime-as-a-service (CaaS) platforms.

3. Distributed Denial of Service (DDoS) – 58.3 Million Events

DDoS attacks continue to disrupt:

E-government services

Online banking platforms

Telecom and cloud infrastructure

Attackers increasingly use IoT botnets and rented DDoS services to overwhelm systems.

4. Brute Force Attacks – 42.7 Million Events

Brute force attacks largely targeted:

Web portals

VPNs

Email servers

The continued use of weak passwords and lack of multi-factor authentication (MFA) remains a key weakness.

5. Web Application Attacks – 11.5 Million Events

These attacks focused on:

SQL injection

Cross-site scripting (XSS)

Insecure APIs

Web apps developed without secure coding practices remain highly vulnerable.

6. Mobile Application Attacks – 310,009 Events

Though smaller in volume, mobile attacks are growing steadily, especially targeting:

Mobile banking apps

Android-based enterprise tools


 Cyber Attack Vector Trends – October to December 2025

Cyber Threat Advisories Issued

To counter the rising threats, KE-CIRT/CC issued:

21,815,814 Cyber Threat Advisories

This represents a 9.34% increase compared to the previous quarter.

Advisory Distribution by Attack Type:

Web Application Attacks: 10.16 million

System Attacks: 7.83 million

Brute Force Attacks: 1.88 million

DDoS Attacks: 1.33 million

Malware Attacks: 591,950

Mobile Application Threats: 6,140

These advisories were disseminated to critical information infrastructure (CII) sectors, including finance, healthcare, energy, transport, and government.

Key Drivers Behind the Surge in Cyber Attacks

πŸ”Ή Inadequate System Patching

Many organizations delay updates due to operational constraints, leaving exploitable vulnerabilities exposed.

πŸ”Ή Low Cyber Awareness

Phishing and social engineering attacks continue to succeed due to limited end-user training.

πŸ”Ή Default Credentials & Poor Password Policies

Default logins and password reuse remain widespread, enabling brute force and credential stuffing attacks.

πŸ”Ή AI-Enabled Threat Actors

Attackers are increasingly leveraging AI and automation to:

Scale attacks

Evade detection

Generate convincing phishing content

Recommended Cybersecurity Measures for Kenya

KE-CIRT/CC continues to emphasize the following defensive measures:

Regular system and application patching

Mandatory Multi-Factor Authentication (MFA)

Strong password and access control policies

Proper firewall and antivirus configuration

Continuous security monitoring and log analysis

Cybersecurity awareness training for users

Share this article:
Views: 239

Recent Articles

  • Cyber Espionage Detection
    When Awareness Fails: How AI Misuse Coul...
    170
  • Cyber Attacks in Kenya: A Three-Month Th...
    239
  • Unlocking the Power of SIEM: Strengtheni...
    901
  • Empowering Endpoint Security: Harnessing...
    741
  • Empowering Cyber Defense: The Art and Sc...
    690

Popular Articles

  • Unveiling the Power of Cyber Threat Inte...
    1377
  • Demystifying Cyber Threat Intelligence:...
    1376
  • Navigating the Cyber Threat Landscape: L...
    1309
  • Empowering Security Posture: The Role of...
    1235
  • Maximizing Network and System Monitoring...
    1223