…Calls for fortification of digital defenses to shield against malicious intrusions
By Chimezie Godfrey
The National Information Technology Development Agency (NITDA), through its Computer Emergency Readiness and Response Team has detected activities of a hacktivist group targeting our vital digital infrastructure.
This is contained in a statement issued by the Head, Corporate Affairs and External Relations, NITDA Mrs Hadiza Umar made available to newsmen Wednesday in Abuja.
Umar stated,”The hacktivist group, known for its politically and religiously motivated cyber campaigns, poses a significant risk to our critical information infrastructure. Their tactics include targeted attacks on government digital services, using various attack types particularly DDoS attack, and they have a track record of successful attacks in various countries.
“NITDA hereby alerts the general public to be wary of the occurrence of these attacks which underscores the undeniable and concerning fact that cyber-attacks are not a distant threat but rather a looming danger that resides much closer to us than we may have previously acknowledged. This realization compels us to recognize the urgency of reinforcing our cyber front, fortifying our digital defenses to shield against these malicious intrusions and secure the safety of our critical information and infrastructure.”
Umar noted that the consequences of such cyber-attacks are always severe and may have wide-ranging impacts which includes disruption of critical services, economic losses, as well as public trust and reputation loss.
“She therefore stated that to guide against attacks targeted towards Government Institutions and other critical sectors, the National Information Technology Development Agency’s Computer Emergency Readiness and Response Team (NITDA-CERRT) seek to advise all Ministries, Departments, and Agencies, including other providers of critical services in the country to ensure the implementation of measures to prevent against DDOS attacks, such as:”Deploying DDoS Monitoring systems to watch out for signs of DDoS attacks.
“Minimizing the attack surface area thereby limiting the options for attackers and allowing you to build protections in a single place. E.g. obscuring the target, closing unused ports and protocols, hence minimizing possible points of attacks.
“Implementing or subscribing to DDoS protection features, applications or services to fortify your cyber defenses against disruptive DDoS attacks. e.g. rate limiting, load balancing, traffic filtering, Content Delivery Network (CDN), Web application Firewalls, etc.
“Ensuring that hosting providers offer abundant redundant Internet connectivity, enabling systems to manage significant volumes of traffic effectively.
“Configuring network hardware such as firewall or router to drop incoming ICMP packets or block DNS responses from outside the network (by blocking UDP port 53).”
She added,”Furthermore, enhancement of all critical national infrastructure such as financial services providers, telecommunications providers, and relevant government service providers should ensure cyber security readiness and resilience by implementing necessary cyber security measures to safeguard against potential attacks.”