SA’s strained, loadshedding-prone grid faces cyberthreats

Issue 3 2025 Power Management, Information Security

South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

As Eskom and a growing pool of independent power producers (IPPs) digitise their operations, integrate renewables into the grid, and roll out smart meters, the country’s energy infrastructure is becoming a high-value target – and a dangerously vulnerable one.

Loadshedding and cyber risk

South Africa’s ongoing loadshedding crisis significantly increases the risk and potential impact of even smaller cyberattacks on the grid. A report on the UK and EU energy sector recently published by KnowBe41, painted a picture of a worryingly active siege on critical infrastructure growing worldwide.

As disconcerting as the risks to grids are with cyberattacks increasing, the consequences are even more dire for grids that are already struggling.

Energy infrastructure under stress is far less resilient to additional shocks. According to the Council for Scientific and Industrial Research (CSIR), in a 2024 survey2, 88% of South African organisations experienced at least one data breach in the past year​, and almost half reported multiple incidents.​ The energy sector is firmly within this trend, with phishing emails and social engineering remaining primary entry points for attackers, including attempts to trick energy company staff into clicking malicious links3.

During loadshedding, utilities rely on intricate, real-time load balancing across increasingly fragile networks. Cyberattacks exploiting this fragility, such as mass smart meter disconnects or fake load signals, would require far less effort to trigger instability or cascading failures than would be required to destabilise stable grids where supply is not constrained.

International case studies validate these fears, with KnowBe4’s 2025 EU Energy Report emphasising the cyber battlefield emerging around European utilities. In 2023, the International Energy Agency noted at an event in Paris that cyberattacks on EU utilities had more than doubled between 2020 and 2022, with attackers increasingly targeting operational technologies. The same vulnerabilities are being introduced locally as South Africa races to install more remotely controllable infrastructure.


Martin Kraemer.

The underestimated weak link: Smart meters

South Africa’s rollout of smart prepaid meters by Eskom and municipalities is meant to modernise revenue collection and demand management, but Deloitte South Africa4 found that IoT-style devices introduce a slew of new cybersecurity risks​.

Smart meters are not inherently unsafe. New models use encryption protocols based on the Standard Transfer Specification (STS), with tamper detection and secure firmware updates. However, real-world breaches reveal that it is not always the meters themselves, but the backend systems that are compromised:

• In 2022, Eskom’s online token vending platform was breached internally, allowing illicit prepaid electricity tokens to be generated​.

• In 2019, City Power’s IT systems were crippled by ransomware, preventing customers from topping up their prepaid electricity​

• Researchers globally have simulated attacks5 in which compromised smart meters could trigger load oscillations, overwhelming substations and even entire energy grids.

These findings echo international concerns. The eFORT project, funded by the EU, found that manipulation of distributed energy devices, like smart meters and EV chargers, could trigger widespread outages​. In South Africa, where loadshedding already forces dynamic rebalancing of supply and demand, even a small-scale coordinated cyberattack on smart meters could have outsized effects.

Renewable expansion adds risks

The UK and EU experiences show that rapid decentralisation and renewable energy growth increase cyber risk. Europe's shift to renewables has been accompanied by attacks on wind farms and solar installations, with 5800 turbines in Germany knocked offline due to a cyber disruption in 2022​.

South Africa’s own decentralisation through independent power producers (IPPs) and the reliance on remote monitoring of solar photovoltaic farms and wind facilities​ replicate these vulnerabilities. Experts warn that many renewable energy operators lack robust cybersecurity postures. Even small gaps, such as using default passwords on control dashboards, can allow hackers to hijack systems​.

This risk is magnified by geopolitical factors; while South Africa’s geopolitical alignment means it may not be a direct target, there is a growing concern that local infrastructure could be collateral damage or a testing ground​ for state-sponsored hackers, much as Ukraine’s grids were before the full-scale conflict began​.

Skills shortages

Compounding the technical vulnerabilities is a severe shortage of cybersecurity skills. The CSIR reports that 63% of cybersecurity roles in South African companies are unfilled or only partially filled. At the same time, only 32% of companies train a majority of their employees in cybersecurity​, leaving the door wide open for phishing and social engineering attacks, which are still the top entry points into critical systems​.

The exploitation of the human element is especially dangerous in energy infrastructure, where compromising just one employee’s credentials could provide a bridge into operational networks​.

Resilience cannot wait

While South Africa has moved to introduce protections, such as the Critical Infrastructure Protection Act of 2019​, enforcement and operational readiness lag behind. As of late 2023, no major energy sites had been officially designated under the act, according to the last public update from the government. Building resilience must move from legislation to practical implementation:

• Critical sites must be formally designated and fortified, both digitally and physically.

• Utilities must secure smart meter backends better, encrypt communications end-to-end, and segment operational networks from administrative systems.

• Incident response plans must explicitly include cyberattack scenarios during loadshedding periods, not just normal operations.

• Real-time monitoring and anomaly detection must be mandatory for all IPPs connected to the grid.

• Ongoing security awareness training must be prioritised, particularly for frontline energy workers.

“The protection of critical infrastructure is paramount, as the research highlights how cyberattacks can cause widespread disruption across the energy sector, impacting everything from power generation to distribution. The need for continuous education, investment in threat detection technologies, and cross-border collaboration to safeguard power infrastructure against escalating cyberthreats has never been clearer.”

As Europe’s energy security crises have demonstrated​, cyber resilience is no longer an IT issue, it is a national security imperative. For South Africa, where supply is already fragile, the consequences of inaction could be devastating. Fortifying the grid against cyberattacks is now as important as physically fortifying power stations themselves.

[References]

1 tinyurl.com/mr3nw7mu

2 tinyurl.com/49ebv2kx

3 tinyurl.com/23sba88f

4 tinyurl.com/4mxewwzx

5 tinyurl.com/bddzwc7t




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Security is synonymous with energy efficiency
Power Management
While Africa may be the smallest contributor to global CO2 emissions, part of its energy journey is to lower emissions and prioritise sustainability across companies, sectors, and industries – including security.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Another, self-induced energy crisis
Power Management
Billions spent on renewable energy and backups to address Eskom’s power issues may be at risk due to poor-quality components, untrained installers, incorrect inverter and battery setups, and a lack of local warranty and maintenance plans.

Read more...
Hydrogen is green but dangerous
Fire & Safety Infrastructure Power Management
Hydrogen infrastructure is developing quickly, but it comes with safety challenges. Hydrogen is flammable, and its small molecular size means it can leak easily. Additionally, fires caused by hydrogen are nearly invisible, making them difficult to detect and respond to.

Read more...
SMARTpod talks to Sophos and Phishield
SMART Security Solutions Technews Publishing Sophos Videos Information Security News & Events
SMARTpod recently spoke with Pieter Nel, Sales Director for SADC at Sophos, and Sarel Lamprecht, MD at Phishield, about ransomware and their new cyber insurance partnership.

Read more...
Cybersecurity and insurance partnership for sub-Saharan Africa
Sophos News & Events Information Security Security Services & Risk Management
Sophos and Phishield Announce first-of-its-kind cybersecurity and insurance partnership for sub-Saharan Africa. The SMARTpod podcast, discussing the deal and the state of ransomware in South Africa and globally, is now also available.

Read more...
Corporate and academic teams can register for Kaspersky contest
Kaspersky News & Events Information Security
Kaspersky has announced the registration opening for its new Kaspersky{CTF} (Capture the Flag) competition, inviting academic and corporate teams from around the globe to compete in a battle of skill, strategy and innovation.

Read more...
Continuous security optimisation.
News & Events Information Security
Cymulate has announced its partnership with SentinelOne, a threat exposure validation and AI-powered cybersecurity platform. The collaboration delivers self-healing endpoint security that empowers businesses to increase protection for every endpoint on their network.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.