Cybersecurity

Nigeria's ₦9 Billion Banking Breach and 4 Other Attacks Reshaping African Cybersecurity in 2025

person
Corespec Team
Mar 2025 · 6 min read
Cybersecurity threat monitoring and digital defence

The Threat Landscape Has Changed

The Nigeria Inter-Bank Settlement System (NIBSS) reported a 186% increase in cyberattacks on financial institutions between 2023 and 2024. In Q1 2025, a tier-1 Nigerian bank suffered a data breach exposing over 2 million customer records, with estimated financial losses of ₦9 billion — including direct theft, regulatory fines, and customer compensation costs.

This is not an isolated incident. It signals a systematic escalation by sophisticated threat actors who have specifically targeted African institutions, correctly perceiving them as relatively under-defended compared to their asset size. The pattern is consistent: attackers invest months in reconnaissance, probe for weak vendor access points, and strike at quarter-end when internal teams are stretched.

Understanding the specific attack vectors hitting Nigerian businesses is the first step to defending against them. Here are the four others our security team is actively tracking — in addition to the banking breach.

186% Increase in cyberattacks on Nigerian financial institutions between 2023 and 2024, according to NIBSS threat intelligence reports.

Attack #1 — Business Email Compromise (BEC)

Nigeria's exposure to Business Email Compromise remains among the highest globally, as ranked by the FBI's Internet Crime Complaint Center. In BEC attacks, threat actors compromise a legitimate corporate email account — typically a finance director or senior executive — and use it to redirect high-value payments to attacker-controlled accounts.

The sophistication has increased significantly. Modern BEC attackers spend weeks monitoring email threads to understand payment cadences, vendor relationships, and language patterns before sending a single fraudulent instruction. By the time the wire transfer is flagged, the funds are often moved through multiple intermediary accounts.

  • Average loss per BEC incident in Nigeria in 2024: $62,000
  • Primary targets: legal firms, real estate developers, manufacturing companies
  • Attack vector: phishing, credential stuffing, or purchasing compromised credentials
  • Defence: out-of-band payment verification, MFA on all email accounts, staff awareness training

Attack #2 — Ransomware on Critical Infrastructure

Port of Lagos logistics operators faced ransomware demands totalling $1.2 million in January 2025, with operational systems locked for 72 hours. The impact cascaded across freight forwarders, customs agents, and manufacturers waiting on raw material shipments.

Power distribution companies remain especially vulnerable. Operational technology (OT) networks — the systems controlling physical infrastructure — were historically air-gapped from the internet. As those systems are increasingly connected for remote monitoring and efficiency, they become attack surfaces. Many OT systems run on end-of-life software that cannot be patched without disrupting operations.

  • Primary attack vector: phishing emails targeting operations and maintenance staff
  • Sectors at highest risk: utilities, ports, manufacturing, hospitals
  • Average ransom demand targeting African critical infrastructure: $450,000–$2M
  • Defence: network segmentation between IT and OT, offline backups tested quarterly, incident response rehearsal

Attack #3 — SIM Swap & Mobile Banking Fraud

Nigeria leads Africa in SIM swap attacks, with mobile network operators reporting over 14,000 confirmed cases in H2 2024. In a SIM swap, an attacker uses social engineering — posing as the account holder — to convince a telco customer service agent to transfer a victim's phone number to a new SIM card controlled by the attacker.

Once they control the number, all SMS-based one-time passwords (OTPs) are redirected. Within minutes, attackers can access banking apps, reset passwords, and drain accounts before the victim realises their phone has lost signal. The entire attack cycle — from SIM swap to empty account — routinely completes in under 20 minutes.

  • 14,000+ confirmed SIM swap cases in Nigeria in H2 2024
  • Average time to drain account after successful SIM swap: 8–20 minutes
  • Defence for individuals: use authenticator apps (not SMS) for MFA, set a port-out PIN with your telco
  • Defence for banks: biometric re-authentication for high-value transfers, SIM change cooling-off periods
14,000+ Confirmed SIM swap cases reported by Nigerian mobile network operators in the second half of 2024 alone.

Attack #4 — Supply Chain Compromise

Third-party software vendors used by Nigerian banks and fintechs have become a primary attack vector — and one of the hardest to defend against. In Q4 2024, a compromised payroll SaaS provider gave attackers access to 47 client companies simultaneously. None of those companies had done anything wrong individually; they simply trusted a vendor that had not maintained adequate security controls.

This is the supply chain problem: your security posture is only as strong as the weakest link in your vendor ecosystem. A single compromised accounting software provider, payroll system, or HR platform can cascade into dozens of corporate breaches.

  • Defence: zero-trust architecture — assume no vendor access should be implicitly trusted
  • Conduct annual vendor security audits as a contract requirement
  • Minimum-privilege access: vendors should only see what they absolutely need
  • Incident response plans must include vendor compromise scenarios

What Businesses Must Do Right Now

The common thread across all five attack types is that basic security hygiene dramatically reduces risk. The majority of successful breaches exploit known vulnerabilities, unpatched systems, or untrained staff — not novel zero-day exploits.

  • Employee security awareness training — human error causes 82% of breaches (Verizon DBIR 2024)
  • Multi-factor authentication on all corporate systems, email, and cloud access
  • A tested incident response plan — not a document in a drawer, but a rehearsed procedure
  • Security Operations Centre (SOC) monitoring — either in-house or managed service
  • Annual penetration testing by a certified ethical hacker
  • Vendor security assessments as part of procurement due diligence

These are the standards Corespec trains professionals to implement — and that our security consulting team deploys for client organisations. The question is not whether your business will face a cyberattack. The question is whether you will be prepared when it arrives.

Assess Your Cybersecurity Posture Today

Corespec offers cybersecurity audits, penetration testing, and staff security awareness training for Nigerian businesses. Book a consultation to understand where your exposure is greatest.

Get Started →