Online Abuse in Kenya Up by 1155%, Kenyan Companies Still Use Dumb Passwords – Report


speedtest global index kenya

The Communications Authority of Kenya recently released their Q1 2018 Sector Statistics Report and it has some interesting tidbits.

First is the section about the National Cyber Threat Landscape. The National KE-CIRT/CC detected over 7.9 million cyber threats, which was a 25% drop compared to the previous quarter.

The most interesting tidbit under the various list of cyber threats detected is the rise of online abuse in the time frame the data was collected. According to CA, online abuse has increased by 1155% compared to last quarter (1757 cases vs 140) which is quite significant.

During this quarter, the National KE-CIRT/CC validated and escalated 3,488 cases, of which online abuse took the lions share (1737 cases) up from 99 last quarter. This was a 1654.5% increase. According to them, online abuse means ‘online fraud, hate speech, incitement to violence and fake news.’

The other forms of attacks showed varied percentages of decrease or increase when compared to the quarters. Malware was down by 27.8%, Web application attacks was up by almost 2%, botnet attacks were down by 36%, system misconfiguration was down by 5% and online impersonations were down by a massive 77%.

The report also revealed the top most targeted service ports when unscrupulous identities targeted file sharing, web services or voice over IP (VoIP) applications. This includes:

  • Port 445 which is Microsoft Directory Services that is used for sharing files in Windows
  • Port 80 (HTTP)
  • Port 5060 (Session Initiation Protocol) that is used for signaling and controlling multimedia sessions like VoIP and Chat
  • Port 22 (Secure Shell) that is used for securely connecting to remote machines on the same or different network
  • Port 23 (Telnet) that allows a user on one computer to log onto another computer on the same or different network.

The other bit of news is about the common username and passwords used in brute force attacks. It is surprising such basic passwords and usernames are being used by a majority of software and hardware vendors

Here are the top usernames and passwords and their total number of instances.


  1. root (2011)
  2. user (1141)
  3. usuario (81)
  4. test (51)
  5. guest (46)
  6. ftpuser (40)
  7. support (31)
  8. postfix (26)
  9. postgres (25)
  10. hadoop (20)


  1. admin (209)
  2. 1234 (165)
  3. password (197)
  4. 12345 (143)
  5. Root (97)
  6. Ubnt (102)
  7. 123456 (138)
  8. default (99)
  9. 0000 (102)
  10. admin123 (73)