Cyber Threat Map of the Central Sahel Region
A Fragile Fundation of Development
DOI:
https://doi.org/10.12700/jceeas.2025.5.3.416Keywords:
Central Sahel, Cybersecurity, threats, digitalization, developmentAbstract
The developing, but often fragile digital infrastructure of the Central Sahel region – especially the countries of Burkina Faso, Mali, Niger and Chad – are recent targets of various cyberattacks. Despite the financial situation of these countries, cybercriminals and even state-sponsored threat actors are continuously exploiting public internet-facing IT systems that are affected by security vulnerabilities.
This study aims to describe the current state of the region’s digital infrastructure and cyber threat landscape, while identifying the key aspects of sustainable growth and the potential limitations of the countries’ cybersecurity posture.
Although the region had limited access to the internet in the past, it has witnessed significant increase in the number or households with mobile internet connectivity. This digital expansion affects the daily life of the population, alongside the difficulties of infrastructional underdevelopment, social and financial inequalities and the political instability and all of these factors are leading to a fragile digital environment. Social media usage had also shown a significant increase in the last decade in this region, and it also gave room for political influence, spreading propaganda or deepfake messages and even for the online requitment of armed groups (e.g. JNIM, ISGS).
This paper also provides an overview of the current regulations and legal landscape of the countries in this region. In this constantly evolving territory, the legal and institutional background of cybersecurity governance is of key importance in addressing cyber threats and incidents. This study also discusses the main cyber events affecting the Central Sahel region in the recent years and aims to analyse the presence, operational capacity and maturity level of national CERTs and international partnerships to address cyber threats.
References
Africa Center for Strategic Studies (2024). Mapping a Surge of Disinformation in Africa, Retrieved July 10, 2025 from https://africacenter.org/spotlight/mapping-a-surge-of-disinformation-in-africa/
ANSSI (2025), National Cybersecurity Agency of Burkina Faso, Retrieved July 10, 2025 from https://anssi.bf/
Besenyő, J., Gulyás, A. (2021). The Effect of the Dark Web on the Security. Journal of Security and Sustainability Issues, 11(1), 103-121. DOI: https://doi.org/10.47459/jssi.2021.11.7
Bezborodko A. (2024). Cybersecurity threatscape for African countries Q1 2023 – Q3 2024, Retrieved July 12, 2025 from https://global.ptsecurity.com/en/research/analytics/cybersecurity-threatscape-for-african-countries-q1-2023-q3-2024/
Cinini, S. F., Ehiane, S. O., Osaye, F. J., & Irewunmi , B. A. (2023). The Trends of Cybersecurity and its Emerging Challenges in Africa. In S. O. Ehiane, S. A. Olofinbiyi, & S. M. Mkhize (Eds.), Cybercrime and Challenges in South Africa (1st ed., pp. 75-106). Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-99-3057-9_4
Cox K., Marcellino W., Bellasio J., Ward A., Galai K., Meranto S., Paoli G. P. (2018). Social Media in Africa: A double-edged sword for security and development, Retrieved July 12, 2025 from https://www.undp.org/sites/g/files/zskgke326/files/migration/africa/UNDP-RAND-Social-Media-Africa-Executive-Summary_final_3-Oct.pdf
Council of Europe (2025). Octopus Cybercrime Community, Retrieved July 10, 2025 from https://www.coe.int/en/web/octopus/
DarkReading (2024). Anonymous Sudan Launches Cyberattack on Chad Telco. Retrieved July 12, 2025 from https://www.darkreading.com/cyberattacks-data-breaches/anonymous-sudan-launches-cyberattack-on-chad-telco
Global Forum on Cyber Expertise (2025). Chad, Retrieved July 10, 2025 from https://thegfce.org/member-and-partner/chad/
Hassan, I. (2024). Outlaws Are Weaponizing Disinformation in Northern Nigeria, Retrieved July 12, 2025 from https://www.cigionline.org/articles/outlaws-are-weaponizing-disinformation-in-northern-nigeria/
INTERPOL Africa Cybercrime Operations Desk (2025). INTERPOL AFRICA CYBERTHREAT ASSESSMENT REPORT 2025, 4th edition, Retrieved July 10, 2025 from https://www.interpol.int/en/content/download/23094/file/Cybercrime_Africa%20Cyberthreat%20Assessment%20Report_Design_FINAL.pdf
Kassouwi, I.K. (2025), Mali to Launch National Cybersecurity Strategy This Year, Retrieved July 10, 2025 from https://www.wearetech.africa/en/fils-uk/news/public-management/mali-to-launch-national-cybersecurity-strategy-this-year
Kemp, S. (2025). Digital 2025: Global Overview Report, Retrieved July 12, 2025 from https://datareportal.com/reports/digital-2025-global-overview-report
Kshetri, N. (2019) Cybercrime and Cybersecurity in Africa, Journal of Global Information Technology Management, 22:2, pp. 77-81, DOI: https://doi.org/10.1080/1097198X.2019.1603527
Lakshmanan, R. (2022). OPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa, Retrieved July 12, 2025 from https://thehackernews.com/2022/11/researchers-detail-opera1er-apt-attacks.html
L’Economiste (2023). La BOA Mali victime d'une cyberattaque, Retrieved July 12, 2025 from https://www.leconomiste.com/flash-infos/la-boa-mali-victime-d-une-cyberattaque
Maleh, Y., Maleh, Y. (2022). The African View on Cybersecurity. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham., pp 29-40., DOI: https://doi.org/10.1007/978-3-031-18475-8_3
Onyido, J. C., Okoro F., Abdulsalam M., Adeyeye P. (2024)., ICLG - Cybersecurity Laws and Regulations - Nigeria Chapter, Retrieved July 12, 2025 from https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/nigeria
Pantserev, K. A. (2022). Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity. Vestnik RUDN. International Relations, 22(2), pp. 288-302. DOI: https://doi.org/10.22363/2313-0660-2022-22-2-288-302
Reuters (2023). Senegalese government websites hit with cyber attack, Retrieved July 12, 2025 from https://www.reuters.com/world/africa/senegalese-government-websites-hit-with-cyberattack-2023-05-27/
Vermeersch E., Coleman J., Demuynck M., Dal Santo E., (2020). The Role of Social Media in Mali and its Relation to Violent Extremism: A Youth Perspective, Retrieved July 12, 2025 from https://icct.nl/sites/default/files/import/publication/Social-Media-in-Mali-and-Its-Relation-to-Violent-Extremism-A-Youth-Perspective.pdf
Wright, G. (2025). Bending the Baobab: AI’s Erosion of Security in the Sahel, Retrieved July 12, 2025 from https://georgetownsecuritystudiesreview.org/2025/01/03/bending-the-baobab-ais-erosion-of-security-in-the-sahel/
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Viktor Szulcsányi, Gyula Vörös

This work is licensed under a Creative Commons Attribution 4.0 International License.