The Interest Behind Cyber-Attacks Targeting Africa and Attributed to the Region

Analysing Chinese Influence Behind Cyber-Operations in Africa

Authors

DOI:

https://doi.org/10.12700/jceeas.2025.5.4.423

Keywords:

China, Africa, influence, cyber, digitalisation

Abstract

Over the past decade, the global importance of cybersecurity has steadily increased as states, companies and societies have become increasingly reliant on digital infrastructures. In parallel, Africa is undergoing a digital transformation, but this rapid growth is often not matched by adequate cybersecurity capabilities, making many states particularly vulnerable to cyber threats. In this rapidly changing environment, China's growing technological presence and expansion in Africa are noteworthy, not only in terms of economic and infrastructural support, but also in the form of a new type of digital influence. The primary objective of the research is to explore the types of technological and financial support China is providing to African countries in the digital sector, the extent to which and how this support is contributing to the development of African states' cyber capabilities.  Within this context, the study also analyses the types and characteristics of cyber operations in the region, the possible underlying motivations, and the types of actors (state-sponsored actors, cybercriminals or hacktivists) and their presence behind the attacks. The research will also seek to assess how China affects the digital sovereignty of African countries and its impact on security policy in the region.

References

Africa Center for Strategic Studies. (2025). Understanding Africa’s Emerging Cyber Threats. Africa Center for Strategic Studies. Retrieved August 10, 2025 from https://africacenter.org/programs/cyber/?utm

African Business. (2024). Kaspersky identifies SideWinder Advanced Persistent Threat (APT) expanding attacks with new espionage tool. Retrieved August 10, 2025 from https://african.business/2024/10/apo-newsfeed/kaspersky-identifies-sidewinder-advanced-persistent-threat-apt-expanding-attacks-with-new-espionage-tool

Agbebi, M. (2022). China’s Digital Silk Road and Africa’s Technological Future. Council on Foreign Relations. Council on Foreign Relations (CFR). Retrieved August 10, 2025 from https://www.cfr.org/sites/default/files/pdf/Chinas%20Digital%20Silk%20Road%20and%20Africas%20Technological%20Future_FINAL.pdf

Arnold, S. (2024). Africa needs China for its digital development – but at what price? Retrieved August 10, 2025 from https://world.edu/africa-needs-china-for-its-digital-development-but-at-what-price/

Article 19. (2024). China-Africa Cooperation: Beijing’s vision raises free expression concerns. Retrieved August 10, 2025 from https://www.article19.org/resources/china-africa-cooperation-beijings-vision-raises-free-expression-concerns/

Ayodele, O. (2022). US’s and China’s ‘chipageddon’ hits Africa’s digital transformation mission. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/us-and-chinas-chipageddon-hits-africas-mission-to-build-digital-economies/

Bagwandeen, M. (2022). China expands its digital sovereignty to Africa. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/china-expands-its-digital-sovereignty-to-africa/

Bagwe, M. (2025). Africa Faces a Digital Sextortion Crisis as Numbers Surge Across the Continent. Retrieved August 10, 2025 from https://thecyberexpress.com/africa-faces-a-digital-sextortion-crisis/

Brickstone. (2024). The Hidden Costs of China’s Digital Ambitions in Africa: Are We Ready for the Consequences? Retrieved August 10, 2025 from https://brickstone.africa/the-hidden-costs-of-chinas-digital-ambitions/

Caldwell, A. (2025). South Africa’s Digital Future Undermined by Growing Cyber Threats. Retrieved August 10, 2025 from https://informationstreamer.com/2025/03/20/south-africas-digital-future-undermined-by-growing-cyber-threats/

Cannon, B. J. (2025). Maps showing China’s growing influence in Africa distort reality – but some risks are real. The Conversation. Retrieved August 10, 2025 from https://theconversation.com/maps-showing-chinas-growing-influence-in-africa-distort-reality-but-some-risks-are-real-249454

Chacha, L., & Barclay, C. (2024). Mapping Africa’s Cybersecurity Development - Insights from the Global Cybersecurity Index 2024. DPO Caribbean.

China Africa Research Initiative. (2025). Chinese FDI in Africa Data Overview. Retrieved August 10, 2025 from https://www.sais-cari.org/chinese-investment-in-africa

Chitanga, G. (2022). Wired Africa now Zooms into China and US. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/wired-africa-now-zooms-into-china-and-us/

Cisco. (2025). 2025 Cisco Cybersecurity Readiness Index: Readiness remains flat as AI transforms the industry. Retrieved August 10, 2025 from https://newsroom.cisco.com/c/dam/r/newsroom/en/us/interactive/cybersecurity-readiness-index/2025/documents/2025_Cisco_Cybersecurity_Readiness_Index.pdf

Cloudflare. (2025). What is Anonymous Sudan? August 10, 2025. https://www.cloudflare.com/learning/ddos/glossary/anonymous-sudan/

Collard, A. (2025). African Cybersecurity & Awareness Report 2025. KnowBe4 Whitepaper. Retrieved August 10, 2025 from https://www.knowbe4.com/hubfs/Africa-Annual-Survey_Whitepaper_US_EN-F.pdf#prId=332108

Cybercrimes Act. (2025). The full text of the Cybercrimes Act in South Africa. Retrieved August 10, 2025 from https://cybercrimesact.co.za/

De, R. (2025). China-Africa Relations: Debt and Investment – Are there new models for engagement? Finance for Development Lab. Retrieved August 10, 2025 from https://findevlab.org/china-africa-relations-debt-and-investment-are-there-new-models-for-engagement/

Dedola, G., & Berdnikov, V. (2025). SideWinder targets the maritime and nuclear sectors with an updated toolset. Retrieved August 10, 2025 from https://securelist.com/sidewinder-apt-updates-its-toolset-and-targets-nuclear-sector/115847/

Dinika, A. A. (2022). ICT investments: Africa waits to see the money. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/us-china-ict-investments-implications-for-africas-socioeconomic-development/

Ecofin Agency. (2024). ITU Names 7 African Nations Among Top Cybersecurity Models. Retrieved August 10, 2025 from https://www.ecofinagency.com/telecom/1709-45902-itu-names-7-african-nations-among-top-cybersecurity-models

Enovise Group. (2024). The Current State of Cyber Threats in Africa – Insights from the Interpol’s 2024 African Cyberthreat Assessment Report (3rd Edition). Retrieved August 10, 2025 from https://www.linkedin.com/pulse/current-state-cyber-threats-africa-insights-from-interpols-african-siijf

Expression Africa. (2025). Over half of Africans fear financial losses from cybercrime – KnowBe4. Retrieved August 10, 2025 from https://expression.africa/over-half-of-africans-fear-financial-losses-from-cybercrime-knowbe4/

Gariba, A. (2022). Democracy in Africa: Enter the dragon. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/democracy-in-africa-enter-the-dragon/

Global System for Mobile Communications Association (GSMA). (2023). The State of Mobile Internet Connectivity 2023: Sub-Saharan Africa key trends. Retrieved August 10, 2025 from https://www.gsma.com/r/wp-content/uploads/2023/10/State-of-Mobile-Internet-Connectivity-2023-Sub-Saharan-Africa.pdf

Good Governance Africa. (2022). Africa in Fact. China vs US: the battle for digital supremacy in Africa. Retrieved August 10, 2025 from https://gga.org/project/issue-62/

Gopaldas, R. (2022). A theatre for competition. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/a-theatre-for-competition/

Hegel, T. (2023). Cyber Soft Power. China’s Continental Takeover. SentinelOne. Retrieved August 10, 2025 from https://www.sentinelone.com/labs/cyber-soft-power-chinas-continental-takeover/

Huang, Z., & Pollio, A. (2023). Between highways and fintech platforms: Global China and Africa’s infrastructure state. Geoforum, 147, 103876. https://doi.org/10.1016/j.geoforum.2023.103876

International Telecommunication Union (ITU). (2024a). Estonia ranks fifth in the global cybersecurity index. Retrieved August 10, 2025 from https://www.itu.int/en/ITU-D/Cybersecurity/Pages/Estonia-ranks-fifth-in-the-global-cybersecurity-index.aspx

International Telecommunication Union (ITU). (2024b). Global Cybersecurity Index 2024. ITU Publications. https://www.itu.int/en/ITU-D/Cybersecurity/Documents/GCIv5/2401416_1b_Global-Cybersecurity-Index-E.pdf

INTERPOL. (2025). New INTERPOL report warns of sharp rise in cybercrime in Africa. Retrieved August 10, 2025 from https://www.interpol.int/content/download/23094/file/25COM009248%20-%20Cybercrime_Africa%20Cyberthreat%20Assessment%20Report_Design_2025-05%20v11.pdf

Investec. (2024). Cybersecurity: Trends, threats, and strategy. Retrieved August 10, 2025 from https://www.investec.com/en_za/focus/money/cybersecurity-in-south-africa-2024.html

ITEdgeNews. (2024). Kenya on high alert: Hacktivist group Anonymous sends warnings to government. Retrieved August 10, 2025 from https://www.itedgenews.africa/kenya-on-high-alert-hacktivist-group-anonymous-sends-warnings-to-government/

Kaspersky. (2025a). 14% increase in spyware attacks on African businesses: Kaspersky presents a cyberthreat landscape report at GITEX Africa in Morocco. Retrieved August 10, 2025 from https://www.kaspersky.com/about/press-releases/14-increase-in-spyware-attacks-on-african-businesses-kaspersky-presents-a-cyberthreat-landscape-report-at-gitex-africa-in-morocco

Kaspersky. (2025b). Africa Cyberthreat Landscape Report 2025. Retrieved August 10, 2025 from https://content.kaspersky-labs.com/se/media/en/africa-cyberthreat-landscape-report-2025.pdf

Kaspersky. (2025c). Cybersécurité: les entreprises africaines face à une hausse préoccupante des attaques, selon Kaspersky. August 10, 2025). https://www.kaspersky.fr/about/press-releases/cybersecurite-les-entreprises-africaines-face-a-une-hausse-preoccupante-des-attaques-selon-kaspersky

Kaspersky. (2025d). FruityArmor. Retrieved August 10, 2025 from https://apt.securelist.com/apt/fruityarmor

Kearney. (2023). Cybersecurity in Africa – call to action. Retrieved August 10, 2025 from https://www.kearney.com/documents/291362523/296371292/Cybersecurity+in+Africa%E2%80%94a+call+to+action.pdf/cb6f42c4-570c-ddd7-4f8c-719507863674?t=1683214143000

Kitili, J., & Abiero, D. (2023). Kenya’s Digital Infrastructure Under Threat? A Look at Anonymous Sudan’s Thwarted Cyberattack Attempt and its Implications for Kenya’s Digital Systems. Strathmore University Centre for Intellectual Property and Information Technology Law (CIPIT) blog. Retrieved August 10, 2025 from https://cipit.strathmore.edu/kenyas-digital-infrastructure-under-threat-a-look-at-anonymous-sudans-thwarted-cyberattack-attempt-and-its-implications-for-kenyas-digital-systems/

Kluiver, J. (2025). China-Africa Investments in 2025: Key Trends and How it can Improve Africa’s Competitiveness. Africa International Advisors. Retrieved August 10, 2025 from https://www.africaia.com/insights/china-africa-investments-in-2025-key-trends-and-how-it-can-improve-africas-competitiveness

Kovacs, E. (2023). China’s Offensive Cyber Operations in Africa Support Soft Power Efforts. Retrieved August 10, 2025 from https://www.securityweek.com/chinas-offensive-cyber-operations-in-africa-support-soft-power-efforts/

Krukowska, M. M. (2024). China’s security relations with Africa in the 21st Century. Security and Defence Quarterly, 46(2), 4-23. https://doi.org/10.35467/sdq/190066

Labscon. (2023). The Cyber Arm of China’s Soft Power: Reshaping a Continent. SentinelOne. Retrieved August 10, 2025 from https://www.sentinelone.com/labs/labscon-replay-the-cyber-arm-of-chinas-soft-power-reshaping-a-continent/

Lakshmanan, R. (2024). New Frontiers, Old Tactics: Chinese Espionage Group Targets Africa & Caribbean Govts. Retrieved August 10, 2025 from https://thehackernews.com/2024/05/new-frontiers-old-tactics-chinese-cyber.html?m=1&

MANCOSA. (2025). South Africa's digital future hindered by rising cyber threats. Retrieved August 10, 2025 from https://www.fanews.co.za/article/technology/41/general/1204/south-africa-s-digital-future-hindered-by-rising-cyber-threats/41284

Mare, A. (2022). Digital diplomacy shootout in Zimbabwe. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/zims-chinese-and-us-embassies-digital-diplomacy/

Matanda, D. (2022). How the contest for global digital hegemony impacts Africa. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/how-contest-for-global-digital-hegemony-impacts-africa/

Mboya, C. (2022). No Huawei, no cry. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/no-huawei-no-cry/

Meservey, J. (2020). Government Buildings in Africa Are a Likely Vector for Chinese Spying. The Heritage Foundation. Retrieved August 10, 2025 from https://www.heritage.org/asia/report/government-buildings-africa-are-likely-vector-chinese-spying

Michael, C. (2025). Top 10 cyberattacks that targeted African organisations in 2024. Retrieved August 10, 2025 from https://businessday.ng/news/article/top-10-cyberattacks-that-targeted-african-organisations-in-2024/

Mitre att&ck. (2025). MuddyWater. Retrieved August 10, 2025 from https://attack.mitre.org/groups/G0069/

Mordor Intelligence. (2025). Europe Cybersecurity Market Size, Share, Analysis, Trends (2025 - 2030). Retrieved August 10, 2025 from https://www.mordorintelligence.com/industry-reports/europe-cybersecurity-market

Mudau, P. (2022). Big-spending China woos Africa with its BRI and DSR. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/chinese-foreign-aid-to-africa-for-ict-implications-for-the-us/

Munyati, C. (2024). Why strong regional value chains will be vital to the next chapter of China and Africa’s economic relationship. World Economic Forum. Retrieved August 10, 2025 from https://www.weforum.org/stories/2024/06/why-strong-regional-value-chains-will-be-vital-to-the-next-chapter-of-china-and-africas-economic-relationship/

Ndzendze, B. (2022). South Africa’s 4IR strategy. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/south-africas-4ir-strategy/

Nelson, N. (2024). China APT Stole Geopolitical Secrets From Middle East, Africa & Asia. Darkreading. Retrieved August 10, 2025 from https://www.darkreading.com/threat-intelligence/china-apt-stole-geopolitical-secrets-from-middle-east-africa-and-asia

Paterson, S. (2024). How much of China’s investment into Africa is real? Hinrich Foundation. Retrieved August 10, 2025 from https://www.hinrichfoundation.com/research/article/fdi/how-much-of-china-investment-into-africa-is-real/

Prakash, S. (2025). The Digital Silk Road: China’s Technological Engagement in Africa. Roosevelt-Group. Retrieved August 10, 2025 from https://roosevelt-group.org/quick-takes/the-digital-silk-road-chinas-technological-engagement-in-africa

Protectionweb. (2025). New INTERPOL report warns of sharp rise in African cybercrime. Retrieved August 10, 2025 from https://www.protectionweb.co.za/cyber-security/new-interpol-report-warns-of-sharp-rise-in-african-cybercrime/

Reuters. (2025). UK discovers Russian 'espionage tool', sanctions GRU officers over cyberattacks. Retrieved August 10, 2025 from https://www.reuters.com/world/uk/uk-discovers-russian-espionage-tool-sanctions-gru-officers-over-cyberattacks-2025-07-18/

Rio, N. (2024). Russia’s offensive on “digital sovereignty” in Africa. Retrieved August 10, 2025 from https://incyber.org/en/article/russias-offensive-on-digital-sovereignty-in-africa/

Rochberger, L., & Frank, D. (2024). Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia. Paloalto Networks. Retrieved August 10, 2025 from https://unit42.paloaltonetworks.com/operation-diplomatic-specter/

Rojo, J. V. (2023). China’s technological footprint in Africa: A patent network analysis. South African Journal of Business Management, 55(1), a4331. https://doi.org/10.4102/sajbm.v55i1.4331

Threat Hunter Team. (2023). Daggerfly: APT Actor Targets Telecoms Company in Africa. Retrieved August 10, 2025 from https://www.security.com/threat-intelligence/apt-attacks-telecoms-africa-mgbot

Trithart, A. (2022). Disinformation against UN Peacekeeping Operations. International Peace Institute. Retrieved August 10, 2025 from https://www.ipinst.org/wp-content/uploads/2022/11/2212_Disinformation-against-UN-Peacekeeping-Ops.pdf

Umejei, E. (2022). The internet war in Africa. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/the-internet-war-in-africa/

United Nations Trade and Development (UNCTAD). (2025). World Investment Report 2025. Retrieved August 10, 2025 from https://unctad.org/publication/world-investment-report-2025

Venske, T. (2022). Sovereignty and digital transformation in Africa. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/sovereignty-and-digital-transformation-in-africa/

Walsh, M. (2025). Africa faces cybercrime crisis amid weak enforcement, INTERPOL warns. Retrieved August 10, 2025 from https://cybernews.com/cybercrime/interpol-africa-cybercrime-forensics/

Wekesa, B. (2022). Policy, legal and regulatory issues in Africa’s digital sphere. Good Governance Africa. Retrieved August 10, 2025 from https://gga.org/legal-and-regulatory-issues-in-africas-digital-sphere/

Wolfenden, K. L. (2025). Cybersecurity Concerns Increase in Africa as Mobile Banking and AI Threats Surge. Retrieved August 10, 2025 from https://techafricanews.com/2025/02/18/knowbe4-report-highlights-digital-risks-in-africa-amid-growing-use-of-technology/

World Bank Group. (2022). Cyber Threats to the Financial Sector in Africa. An Assessment of the Current Threat and an Analysis of Emerging Trends on the Future Threat Landscape. Retrieved August 10, 2025 from https://documents1.worldbank.org/curated/en/099830405172214598/pdf/P16477000601530760af01093740e385fe8.pdf

Downloads

Published

2026-02-04

How to Cite

Csunyó, N. (2026). The Interest Behind Cyber-Attacks Targeting Africa and Attributed to the Region : Analysing Chinese Influence Behind Cyber-Operations in Africa. Journal of Central and Eastern European African Studies, 5(4), 32–53. https://doi.org/10.12700/jceeas.2025.5.4.423