Cyber Threat Map of the Central Sahel Region

A Fragile Fundation of Development

Authors

DOI:

https://doi.org/10.12700/jceeas.2025.5.3.416

Keywords:

Central Sahel, Cybersecurity, threats, digitalization, development

Abstract

The developing, but often fragile digital infrastructure of the Central Sahel region – especially the countries of Burkina Faso, Mali, Niger and Chad – are recent targets of various cyberattacks. Despite the financial situation of these countries, cybercriminals and even state-sponsored threat actors are continuously exploiting public internet-facing IT systems that are affected by security vulnerabilities.

This study aims to describe the current state of the region’s digital infrastructure and cyber threat landscape, while identifying the key aspects of sustainable growth and the potential limitations of the countries’ cybersecurity posture.

Although the region had limited access to the internet in the past, it has witnessed significant increase in the number or households with mobile internet connectivity. This digital expansion affects the daily life of the population, alongside the difficulties of infrastructional underdevelopment, social and financial inequalities and the political instability and all of these factors are leading to a fragile digital environment. Social media usage had also shown a significant increase in the last decade in this region, and it also gave room for political influence, spreading propaganda or deepfake messages and even for the online requitment of armed groups (e.g. JNIM, ISGS).

This paper also provides an overview of the current regulations and legal landscape of the countries in this region. In this constantly evolving territory, the legal and institutional background of cybersecurity governance is of key importance in addressing cyber threats and incidents. This study also discusses the main cyber events affecting the Central Sahel region in the recent years and aims to analyse the presence, operational capacity and maturity level of national CERTs and international partnerships to address cyber threats.

Author Biographies

Viktor Szulcsányi, Óbudai Egyetem Biztonságtudományi Doktori Iskola

Viktor Szulcsányi holds a Master’s degree in Computer Science Engineering and is currently a doctoral student at the Doctoral School on Safety and Security Sciences at Óbuda University. He has nearly a decade of work experience in the field of cybersecurity. His doctoral research investigates “The Modeling of Attack Group Activities: Opportunities and Challenges in Attribution,” with a focus on the theoretical and practical aspects of cyber threat actor identification. His area of research lie at the intersection of cybersecurity, cyber law, and security policy, aiming to contribute to the development of systematic frameworks for understanding and attributing hostile cyber operations. In addition to his academic pursuits, Viktor Szulcsanyi holds several widely recognized professional certifications, including CISSP, SecurityX, and OSCP, reflecting a strong foundation in both strategic and technical aspects of cybersecurity. His work is aiming to bridge research and practice, supporting evidence-based decision-making in national and organizational cybersecurity contexts.

Gyula Vörös

Gyula Vörös is a dedicated professional in the fields of information security and cyber operations, holding degrees in Information Security Management and Military Systems Operation from the University of Public Service in Hungary. His academic and professional interests center around the complexity of cyberspace and the interactions between state and non-state actors within it. He is currently preparing to apply for doctoral studies, where he intends to conduct research on the strategic dimensions of cyber operations, with a particular focus on the assertion of state interests in the digital domain.

Over the years, he has compiled a comprehensive database of several thousand articles and analyses documenting cyber incidents, operations, and campaigns from around the world. This resource forms the foundation for his planned research, through which he aims to perform a systematic evaluation of cyberspace activity. His analysis will go beyond the traditional criminal perspective, focusing instead on the geopolitical, strategic, and policy-related implications of state-driven cyber operations.

References

Africa Center for Strategic Studies (2024). Mapping a Surge of Disinformation in Africa, Retrieved July 10, 2025 from https://africacenter.org/spotlight/mapping-a-surge-of-disinformation-in-africa/

ANSSI (2025), National Cybersecurity Agency of Burkina Faso, Retrieved July 10, 2025 from https://anssi.bf/

Besenyő, J., Gulyás, A. (2021). The Effect of the Dark Web on the Security. Journal of Security and Sustainability Issues, 11(1), 103-121. DOI: https://doi.org/10.47459/jssi.2021.11.7

Bezborodko A. (2024). Cybersecurity threatscape for African countries Q1 2023 – Q3 2024, Retrieved July 12, 2025 from https://global.ptsecurity.com/en/research/analytics/cybersecurity-threatscape-for-african-countries-q1-2023-q3-2024/

Cinini, S. F., Ehiane, S. O., Osaye, F. J., & Irewunmi , B. A. (2023). The Trends of Cybersecurity and its Emerging Challenges in Africa. In S. O. Ehiane, S. A. Olofinbiyi, & S. M. Mkhize (Eds.), Cybercrime and Challenges in South Africa (1st ed., pp. 75-106). Palgrave Macmillan. DOI: https://doi.org/10.1007/978-981-99-3057-9_4

Cox K., Marcellino W., Bellasio J., Ward A., Galai K., Meranto S., Paoli G. P. (2018). Social Media in Africa: A double-edged sword for security and development, Retrieved July 12, 2025 from https://www.undp.org/sites/g/files/zskgke326/files/migration/africa/UNDP-RAND-Social-Media-Africa-Executive-Summary_final_3-Oct.pdf

Council of Europe (2025). Octopus Cybercrime Community, Retrieved July 10, 2025 from https://www.coe.int/en/web/octopus/

DarkReading (2024). Anonymous Sudan Launches Cyberattack on Chad Telco. Retrieved July 12, 2025 from https://www.darkreading.com/cyberattacks-data-breaches/anonymous-sudan-launches-cyberattack-on-chad-telco

Global Forum on Cyber Expertise (2025). Chad, Retrieved July 10, 2025 from https://thegfce.org/member-and-partner/chad/

Hassan, I. (2024). Outlaws Are Weaponizing Disinformation in Northern Nigeria, Retrieved July 12, 2025 from https://www.cigionline.org/articles/outlaws-are-weaponizing-disinformation-in-northern-nigeria/

INTERPOL Africa Cybercrime Operations Desk (2025). INTERPOL AFRICA CYBERTHREAT ASSESSMENT REPORT 2025, 4th edition, Retrieved July 10, 2025 from https://www.interpol.int/en/content/download/23094/file/Cybercrime_Africa%20Cyberthreat%20Assessment%20Report_Design_FINAL.pdf

Kassouwi, I.K. (2025), Mali to Launch National Cybersecurity Strategy This Year, Retrieved July 10, 2025 from https://www.wearetech.africa/en/fils-uk/news/public-management/mali-to-launch-national-cybersecurity-strategy-this-year

Kemp, S. (2025). Digital 2025: Global Overview Report, Retrieved July 12, 2025 from https://datareportal.com/reports/digital-2025-global-overview-report

Kshetri, N. (2019) Cybercrime and Cybersecurity in Africa, Journal of Global Information Technology Management, 22:2, pp. 77-81, DOI: https://doi.org/10.1080/1097198X.2019.1603527

Lakshmanan, R. (2022). OPERA1ER APT Hackers Targeted Dozens of Financial Organizations in Africa, Retrieved July 12, 2025 from https://thehackernews.com/2022/11/researchers-detail-opera1er-apt-attacks.html

L’Economiste (2023). La BOA Mali victime d'une cyberattaque, Retrieved July 12, 2025 from https://www.leconomiste.com/flash-infos/la-boa-mali-victime-d-une-cyberattaque

Maleh, Y., Maleh, Y. (2022). The African View on Cybersecurity. In: Cybersecurity in Morocco. SpringerBriefs in Cybersecurity. Springer, Cham., pp 29-40., DOI: https://doi.org/10.1007/978-3-031-18475-8_3

Onyido, J. C., Okoro F., Abdulsalam M., Adeyeye P. (2024)., ICLG - Cybersecurity Laws and Regulations - Nigeria Chapter, Retrieved July 12, 2025 from https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/nigeria

Pantserev, K. A. (2022). Malicious Use of Artificial Intelligence in Sub-Saharan Africa: Challenges for Pan-African Cybersecurity. Vestnik RUDN. International Relations, 22(2), pp. 288-302. DOI: https://doi.org/10.22363/2313-0660-2022-22-2-288-302

Reuters (2023). Senegalese government websites hit with cyber attack, Retrieved July 12, 2025 from https://www.reuters.com/world/africa/senegalese-government-websites-hit-with-cyberattack-2023-05-27/

Vermeersch E., Coleman J., Demuynck M., Dal Santo E., (2020). The Role of Social Media in Mali and its Relation to Violent Extremism: A Youth Perspective, Retrieved July 12, 2025 from https://icct.nl/sites/default/files/import/publication/Social-Media-in-Mali-and-Its-Relation-to-Violent-Extremism-A-Youth-Perspective.pdf

Wright, G. (2025). Bending the Baobab: AI’s Erosion of Security in the Sahel, Retrieved July 12, 2025 from https://georgetownsecuritystudiesreview.org/2025/01/03/bending-the-baobab-ais-erosion-of-security-in-the-sahel/

Downloads

Published

2025-11-12

How to Cite

Szulcsányi, V., & Vörös, G. (2025). Cyber Threat Map of the Central Sahel Region : A Fragile Fundation of Development. Journal of Central and Eastern European African Studies, 5(3), 102–116. https://doi.org/10.12700/jceeas.2025.5.3.416