Cybersafetyconnections June 2,2025 Vol #221
- From Konbriefing, there was a cyberattack on the X account of the Police of Dar es Salaam, Tanzania
- The police and users of major Tanzanian internet service providers and the public were impacted cyberattack.
- This attack may have been politically motivated as inferred from the story.
- No cybercriminals have claimed responsibility for the cyberattack.
- Here is how Tanzanian Police mitigated loss from the cyberattack.
What happened?

From Swissinfo.ch , the Tanzanian police account on social network X was compromised and utilized to disseminate false information regarding the death of President Samia Suluhu Hassan.
Who was impacted?
The president of Tanzania, the police and according to NetBlocks, an organization that monitors cybersecurity and internet governance, users of major Tanzanian internet service providers, including Halotel, Airtel, Liquid Telecom, Habari Node, and Vodacom, reported that the platform was inaccessible.
While access to X appeared to be restored in Dar es Salaam, the capital, it remains uncertain whether users in other regions of the country can connect.
Why did it happen?
This incident occurred in the context of President Hassan’s recent public statements criticizing foreign interference in domestic affairs, particularly following the deportation of Kenyan lawyers and activists who traveled to Tanzania to observe the judicial proceedings involving opposition leader Tundu Lissu, who faces treason charges.
Despite initial efforts to promote reforms aimed at enhancing freedom of expression after the presidency of John Magufuli, significant concerns have been raised regarding an escalating pattern of repression against dissenting voices over the past year.
Which cybercriminal Group claimed responsibility for the attack?
Cybercrime and Criminal Defense
No cybercriminal Group have claimed responsibility for the attack.
How did the government of Tanzania mitigate loss from the cyberattack?

OWASP Threat and Safeguard Matrix
Here are the actions taken by the Tanzanian police.
- The Tanzanian police issued a statement asserting that misleading and unethical information was circulating on X and emphasized that such information did not originate from their agency.
- The police stressed the importance of disregarding these false claims and indicated their intention to pursue legal action against individuals who propagate such misinformation
From the digital desk of Copilot, here are immediate and longterm steps Tanzanian police can take to mitigate loss from cyberattacks.
To mitigate losses from a cyber-attack on their X account, Tanzanian Police can take several proactive and reactive steps:
Immediate Response
- Secure the Account: Reset passwords and enable two-factor authentication (2FA) to prevent further unauthorized access.
- Investigate the Breach: Determine how the attack happened—whether through phishing, credential leaks, or malware.
- Notify X Support: Report the hack to X’s security team for potential recovery assistance.
- Alert the Public: Issue an official statement on other platforms to warn citizens about false information or scams.
- Monitor Activity: Check for suspicious posts, messages, or attempted interactions with followers.
Long-Term Security Measures
- Strengthen Cybersecurity Training: Educate officers and social media managers on recognizing and preventing cyber threats.
- Regular Security Audits: Conduct routine assessments of login credentials, app integrations, and security settings.
- Use Official Communication Channels: Ensure critical announcements are made across multiple verified platforms to prevent misinformation.
- Collaborate with Cyber Experts: Work with cybersecurity specialists to implement stronger protections.
- Legal Action Against Attackers: Investigate and pursue legal consequences for those involved in the cyber attack.
Conclusion
Cyber threats are always evolving, so staying vigilant and implementing robust security measures is crucial.
Subscribe to get the latest blog post.
