Kenya records historic cyber attack surge with 4.6 billion threats in four months this year

Data by the Communications Authority of Kenya (CA) shows the spike contributed to a total of 8.6 billion cyberattacks recorded in the year to June 2025, more than double the 3.5 billion incidents logged during a similar period the previous year.
The period between March and June 2025 recorded the highest number of cyber threat incidents in Kenya’s history, with 4.6 billion attacks detected, marking a peak in a year defined by rising digital vulnerabilities and increasingly aggressive cybercriminal tactics.
Data by the Communications Authority of Kenya (CA) shows the spike contributed to a total of 8.6 billion cyberattacks recorded in the year to June 2025, more than double the 3.5 billion incidents logged during a similar period the previous year.
More To Read
- Kenya's cyber threats soar 202 per cent in Q1, hitting 2.5 billion
- Were Judiciary staff locked out by hackers seeking to stall IEBC appeal?
- AI won’t replace computer scientists any time soon – here are 10 reasons why
- Kenya acquires advanced cyber tools sparking privacy concerns
- Six suspects arrested in Mombasa in multi-million cybercrime bust
- Kenya records surge in cybercrime with 82 per cent targeted, gaming sector most hit - report
The 146 per cent rise highlights the growing exposure of Kenya’s public and private systems amid fast-paced digitisation and the expanding capabilities of cybercriminal networks.
CA has attributed the surge to a combination of human, technical and structural weaknesses across key digital platforms.
“The sharp rise in detected cyber threats can be attributed to several factors, including inadequate system patching, limited user awareness of threat vectors such as phishing and other social engineering techniques, as well as the growing adoption of AI-driven attacks and machine learning technologies by malicious actors,” the Authority said.
System attacks, where actors aim to compromise the confidentiality, integrity and availability of computer systems or the data they hold, were the most dominant form of threat, with 4.5 billion incidents detected.
CA notes that the attacks exploit weaknesses in software and hardware, as well as user habits and organisational vulnerabilities.
“The majority of attacks targeted the ICT sector, with a focus on operating systems and database servers managed by Internet Service Providers (ISPs) and cloud service providers,” the Authority said.
“Threat actors primarily exploited outdated system vulnerabilities and exfiltrated user login credentials,” the report added. It further noted that the persistence of such vulnerabilities is “largely attributed to the rapid proliferation of Internet of Things devices, many of which lack comprehensive security protocols.”
In addition to system-based intrusions, the Authority flagged other prevalent forms of attack, including distributed denial of service (DDoS), brute force, malware, mobile application and web application exploits.
“The Authority continued to enhance the dissemination of cyber threat advisories to critical information infrastructure sectors, as part of its proactive response to the evolving cyber threat landscape,” reads the report.
The findings come amid concerns about the capacity of Kenyan institutions, both public and private, to detect and respond to cyber threats effectively, particularly as artificial intelligence enables more complex and adaptive attack methods.
In 2024, cyber criminals attempted to breach key government information infrastructure 114 times between January and August.
A report presented to Parliament attributed the spike in attempted attacks to the continued digitisation of government operations and the migration of essential public services to online platforms. The shift, while improving efficiency and access, has also widened the exposure of public institutions and individuals to a range of cyber threats.
“These threats include malware, cyberbullying, social engineering, and online fraud,” read the report, warning that such vulnerabilities could lead to subversion, espionage, service disruption, and significant financial losses.
Top Stories Today
Reader Comments
Trending
