Explainer: Why cyber threats and scams remain a challenge in South Sudan?

Misinformation and disinformation have been weaponised as tools to build trust and to create convincing narratives in phishing email messages or inbox alerts that influence users to accept or take action, whether by revealing their sensitive information.

Writer: Makur Majeng

As the digital space in South Sudan evolved, it has opened the door to cyber threats and scams from social media platforms and other online channels. The digital space continues to be the biggest driver of information dissemination among human populations, powered by both internet and mobile telecommunications penetration in the country.

Facebook and WhatsApp are widely used means of communication for a great majority. However, these platforms have become grounds for numerous cyber threats and scams—a real danger to users. 

Cyber threats are malicious acts that seek to damage data, steal data, or disrupt digital systems. It is normally perpetrated by individuals, criminal organisations, state actors, and terrorist organisations to achieve specific objectives.

Social media scams are suspicious activities by individuals who create fake profiles or pages and unexpectedly contact users on social media to gain their trust and manipulate them. A social media scammer pretends to be a friend, family member, or anybody with specific interests. 

On the other hand, they impersonate real business entities, employers, the government, and investment or online trading platforms.

This explainer provides an analysis to understand why such threats continue in South Sudan’s social media space.

Cyber Threats and Scams

According to a joint advisory issued by SafetyComm and 211 Check, in September this year, there are different categories of cyber scams rampant in South Sudan.

There have been false alarms where users receive notification messages directly in their inbox or email claiming to be sent from Meta or Facebook about page verification, violations of community standards, and copyright infringement

Some of these messages contain threats of account deletion or suspension and demand users to click malicious links within the next few hours. The intention is to entice the users to click malicious links that may lead to the compromise of their accounts.

In addition to that, a phishing attack has been used to acquire personal information such as usernames, passwords, and credit card details. The attack weaponised malicious links embedded into the false alarm notification messages by those masquerading as trustworthy individuals or entities.  

These cyber threats and scam operations involve social engineering techniques by cybercriminals seeking to manipulate victims into providing their confidential data. 

This method involves using lures to obtain clicks, masquerading as known entities or contacts to entice the victim into providing confidential data like passwords, and clicking on a malicious link embedded within job advertisements, promotions, fake giveaways, or investment schemes.

In the last five years, SafetyComm recorded a total of 854 compromised social media accounts between 2021 and 2024. Most of the cyber threats and scams take place on the Facebook platform, which amounts to 57.3%, with WhatsApp (22.8%) and Instagram (18.9%), as documented by the SafetyComm.

The dangers that come after being comprised is that confidential data not meant for the public will get its way into the hands of unauthorised persons, leading to identity theft, data loss, and, in the worst-case scenario, unauthorised access to private materials like nudes. 

Common Cyber Scams 

Scammers send messages with claims that a user’s profile has met the requirements for a verified badge from Meta, and then users are asked to click shady links within 24 hours before it expires. Users received false alerts that they had violated Meta’s Community Standards by allegedly using fake photos or distributing misleading content and directing users to request a review through a malicious link.

Also, scammers threaten users that their accounts have violated copyright infringement and will be deleted if users fail to repeal the incident through a dubious link. 

So why are cyber scams still rampant in South Sudan?

Many social media users do not have the necessary basic cyber security knowledge and tools to detect and prevent deceptive messages or fraudulent activities.  This makes them vulnerable to clicking on malicious email links without a second thought as to whom the link is coming from, as well as reacting to providing confidential personal data when asked by impersonators. 

There are no strong mechanisms now to enforce cyber laws due to a lack of legal basis and expertise by law enforcement agencies in prosecuting various cyber fraud schemes. The Cybercrime and Computer Misuse Bill is still in parliament for deliberations. This shortcoming has empowered cybercriminals to perpetrate deadly operations against online users in the country. 

The Role of Misinformation and Disinformation

Misinformation and disinformation have been weaponised as tools to build trust and to create convincing narratives in phishing email messages or inbox alerts that influence users to accept or take action, whether by revealing their sensitive information like passwords, credit card numbers, and personal details or by doing what the message has urged them to do.

In this context, by spreading false or misleading information, attackers and scammers exploit online users’ emotions in terms of fear and curiosity to lure them in by clicking on malicious links or providing confidential data.

Conclusion:

The digital landscape in South Sudan has significantly remained vulnerable to cyber threats and scams. This is due to a lack of strengthened information technology infrastructure and a lack of digital literacy skills among online users, which leaves them vulnerable to social engineering tactics employed by cybercriminals.

The absence of enforceable cyber laws has created an environment where perpetrators operate with relative impunity, exploiting loopholes and targeting unsuspecting users on platforms like Facebook and WhatsApp.

To overcome these threats, there is a need to improve cybersecurity infrastructure and enhance digital literacy to empower the public on how to detect and avoid cyber scams. Besides, the national parliament should fast-track the enactment of the Cybercrime and Computer Misuse law to set the stage for enforcement to protect online users.

To ensure accuracy and transparency, we at 211 Check welcome corrections from our readers. If you spot an error in this article, please request a correction using this form. Our team will review your request and make the necessary corrections immediately, if any.

It’s vital to fight misinformation and disinformation in the media by avoiding fake news. Don’t share content you’re uncertain about. False information can harm and mislead people, risking their lives—Fact-check before sharing.  For more details, visit https://211check.org/, or message us on WhatsApp at +211 921 350 435. #FactsMatter.

18 replies
  1. Stephanie Duran
    Stephanie Duran says:

    I caught my husband so many times through his chats and all about cheating on me and when i told him he always claims that he has changed and all. right now he hides his phone from me and i still guess he is cheating cause i could not break into his phone any more so i was referred to a hacker named FRED who i ran to for help and this hacker was able to break into his phone and proved me with the access to my husband phone without my spouse knowing about the hack. Right in my phone I have all my husband’s daily activities . I got to read all his chats, texts, calls, WhatsApp, Facebook, and many more. This hacker is really great, thank you. Did you find this review helpful? contact him via Gmail [email protected] and you can text,call him on +15177981808 or +19782951763

    Reply
    • Jasmine
      Jasmine says:

      Wondering, how to track a cheating wife and obtain proof of her unfaithfulness? Well, the easiest way to catch a cheating wife is to access your spouse’s phone remotely without them ever finding out. With such a cyber professional ( spycheating partner @ G(m)Ail c0m) you can do a lot more than just read her text exchanges in real time. For instance, you can use Remote spy hacker to catch your wife cheating on WhatsApp or other messaging apps. Once you provide her phone number and they get her data activated, it allows you to remotely access all WhatsApp texts and photos, as well as messages from social media platforms like Facebook, Instagram, and Snapchat in real-time. It even offers GPS

      Reply
    • Casimelia
      Casimelia says:

      i had similar issues trying to recover some lost files and they were very important . i tried many tools online , watched videos that will guide me through but all was a waste of time . i felt recovery can’t be possible but then i had this friend who introduced me to Vladmir who specializes on recovery . so i gave him a try and after giving him all necessary details. He actually helped me get back all the lost files. Like i didn’t believe it till i was convinced. so honestly it’s possible to recover any thing you’ve lost or can’t access. You just have to find someone in such field to help you. But if you want to try same person that helped me then you can through ; Remotespyhacker (AT) g(m)a1l dot c0m . Just helping out

      Reply
    • Mary Jordan
      Mary Jordan says:

      Marriage is sweet, Love is also sweet but i don’t see why after getting married to my dream man he still cheated on me with his EX girlfriend though i had try breaking into his IPHONE since last year but still not getting access to his phone since then i just try to swallow all my husband had been doing but i can’t take it any more so i came in contact to gmail of jbeespyhack @gmail com, with his help I had access to my husband’s phone without touching his phone. I had full information of his chats with his ex-girlfriend last year. With all I saw, I don’t think I can move on with the marriage. He went as far as telling the girlfriend that I have been his wrong & i beat her up almost everyday. I was so disappointed & I called off the marriage.. and jbeespyhack@gmail com and you can text him your request

      Reply
  2. Dominika
    Dominika says:

    Wondering, how to track a cheating wife and obtain proof of her unfaithfulness? Well, the easiest way to catch a cheating wife is to access your spouse’s phone remotely without them ever finding out. With such a cyber professional ( REMOTE SPY HACKER @ G(M)AIL C0M ) you can do a lot more than just read her text exchanges in real time. For instance, you can use Remote spy hacker to catch your wife cheating on WhatsApp or other messaging apps. Once you provide her phone number and they get her data activated, it allows you to remotely access all WhatsApp texts and photos, as well as messages from social media platforms like Facebook, Instagram, and Snapchat in real-time. It even offers GPS tracking, allowing you to view their location on Google Maps.

    Reply
  3. toryy lanes
    toryy lanes says:

    I never thought I would fall victim to a crypto scam until I was convinced of a crypto investment scam that saw me lose all my entire assets worth $487,000 to a crypto investment manager who convinced me I could earn more from my investment. I thought it was all gone for good but I kept looking for ways to get back my stolen crypto assets and finally came across Ethical Hack Recovery, a crypto recovery/spying company that has been very successful in the recovery of crypto for many other victims of crypto scams and people who lost access to their crypto. I’m truly grateful for their help as I was able to recover my stolen crypto assets and get my life back together. I highly recommend their services
    EMAIL ETHICALHACKERS009 AT @GMAIL DOT COM
    whatsapp +14106350697

    Reply
  4. Gilbert Jee
    Gilbert Jee says:

    My marriage of 19 years is about to be broken after remotely reading my wife WhatsApp messages with her Boyfriend, that was when I knew I married a smart cheat because she has been seeing this guy 4 years now!!! And I didn’t suspect anything not until I hired ( Zattechhacker @ gmail com ) who gave me 100% access into my wife phone, and all of this was done remotely. Thank you once again ( Zattechhacker @ gmail com )

    Reply
  5. Jessey Anthony
    Jessey Anthony says:

    Hello, everyone, my name is Jessey Anthony am from the Australia-Queensland I was so happy to see a testimonial given by someone called Petrov Ganovish about his cheating ex-wife that wanted his father’s money so I have to contact the email of the man that helps him out in exposing her, for him to help me to expose my husband cheating and wrong deals with other women out there i had to contact PROFESSIONAL WIZARD HACKERS to assist me in the job right now, i have complete access to his phone. I got concrete evidence. it was unbelievable to see the evidence of my hubby cheating on me. Who likes to live with a cheater, I used the evidence I got to file for a divorce. I’m thankful to PROFESSIONAL WIZARD HACKERS for helping me out of my dilemma and suspicions. His services are highly rated and affordable he is best and good in his work contact him email: [email protected] or [email protected] / WhatsApp: +44 7442 684963 Immediately for your areas of Hacking services I have to share the Good news with everyone so u can be able to know the truth of your spouse through mobile spy or phone spy and the offer other services related hacking and funds recovery. Contact him WhatsApp: +44 ( 7442 684963 ) for any type of hacking, he is a professional hacker that Email: [email protected]

    Reply
  6. Emily Parker
    Emily Parker says:

    How Wizard George Recovered My Stolen Cryptocurrency

    My name is Emily Parker, I work as a special investigator in cybercrime. Earlier this year, I suffered a significant personal loss when my Bitcoin wallet valued at $860,089 was hacked in a sophisticated cyberattack. Despite my experience in investigations, the complexity of cryptocurrency theft made the case extremely challenging. I turned to Wizard George Cyber Service, a firm specializing in digital asset recovery. Their team conducted a thorough blockchain forensic investigation, tracked the stolen funds through multiple transactions and wallets, and successfully recovered my entire Bitcoin amount. I was impressed by their professionalism, technical expertise, and commitment to delivering results. For anyone who has lost cryptocurrency to hacking or fraud, I strongly recommend Wizard George Cyber Service as a trusted and effective solution.
    Contact:
    🌐 Website: https://wizardgeorgecyberservice.com
    📧 Email: wizardgeorgecyberservice(AT) g m a l L. C o M
    📞 Phone ‪+1 (807) 698-9213‬

    Reply
  7. Myron Ressler
    Myron Ressler says:

    My crypto wallet was hacked, and I lost $87,000 in BTC and $115,000 in ETH at the time of the breach. I was absolutely devastated, left in shock. In my search for a way to recover my funds, I suspected the breach had happened through my email linked to the wallet, but I couldn’t find any way to regain access, no matter what I tried. I reached out to everyone I trusted, but nothing worked. That was until an old colleague told me about Morphohack Cyber Service, a company specializing in crypto and funds recovery. Without hesitation, I contacted them, and I’m so glad I did. The Morphohack team was incredibly professional and effective, they not only helped me recover my crypto assets but also secured my wallet to prevent future breaches. If you ever find yourself in a similar situation, don’t hesitate to contact Morphohack directly via E-Mail at Morphohack@ cyberservices.com.

    Reply
  8. Julian
    Julian says:

    C on-tact our service.
    Kalfjohnson424 @gmail com

    Our List of Service.
    ▶️Social Media Hack
    ▶️Phone Hacking
    ▶️Scammed Crypto Recovery
    ➡️Increase C re-dit Sc-ore
    ➡️Website Hacking
    ➡️University Results Upgrade
    ➡️Blank ATM Card
    ➡️Data Recovery
    ➡️Private Key Reset.
    For quick response.

    Em -ail: kalfjohnson424 @gmail com
    Border us with your jobs & allow us give you positive result with our hacking skills.
    (c) 2025 All Right Reserved

    Reply
  9. Maryann Jason
    Maryann Jason says:

    Life sometimes can be very disappointing especially when you find out about your spouse’s infidelity. I got in touch with a private expert remotespywise @ gm ail c o m who helped me access my husband’s device after I noticed he always hides things from me. He was super responsive and transparent in his services, don’t wait around and text him right away.

    Reply
  10. Recovery Intelligence
    Recovery Intelligence says:

    RECOVER YOUR LOST CRYPTO ASSETS WITH ASORE HACK INTELLIGENCE. NO UPFRONT PAYMENT REQUIRED.

    Asore Corporation is a team of Cyber Intelligence, Crypto Investigation, Asset Tracing and Offshore Legal experts. Working together to form a boutique cyber and crypto intelligence group focused on providing results.
    Using the latest Cyber Tools, Open Source Intelligence (OSINT), Human Intelligence (HUMINT), and cutting edge technology, we provide actionable intelligence to our clients.

    WHY CHOOSE US?
    – Expert Cyber Investigation Services —Our cyber investigators are certified in the US, UK and experienced with investigations spanning 6 continents.
    – Cryptocurrency And Digital Asset Tracking — We are able to track the movement of different crypto currencies and assets. If the cryptocurrency has been moved, we are able to follow it.
    – Strategic Intelligence For Asset Recovery — The first step to recovery is locating recoverable assets. Our experienced team will be able to walk you through the process.

    Schedule a mail session with our team of professionals today via – asorehackcorp (@) gmail (.) com to get started immediately.

    BEWARE of FABRICATED reviews and testimonies endorsing tricksters, do not get scammed twice.

    Disclaimer: Asore Corporation is not a law enforcement agency and not a law firm. Like all investigators, we cannot guarantee specific results, but we apply our expertise and resources to every case professionally and ethically….

    Reply
  11. Valerie Ball
    Valerie Ball says:

    I discovered Coinfirm on the Coingeco exchanges directory. I want a system that enables me to determine whether my exchange is secure. There solution diligence revealed that the exchange i was using posed a very high risk, thus I am now using a significantly safer exchange. But when it comes to recovery of lost crypto assets, I utilize recoveryhacker101@gmailcom.

    Reply
  12. Isabelle Raveau
    Isabelle Raveau says:

    Finally i am so happy i found this honest, recommended and reliable hacker before now I have been ripped off by fakes who claimed to be professional hackers until i came by hackerspytech @ gmail com a legit hacker across the internet who helped spy on my fiance phone to save my dying relationship exposing chat evidences on my spouse cheating with friend. being ripped off. I appreciate the good hack services hackerspytech provides, does all sorts of cyber hacks like phone spy monitoring calls, sms, Whatsapp, Viber, Instagram, Kik, Hangout, Snapchat, Facebook it will be done fast honest and reliable i promise will provide result always and won’t expose your confidential data to anyone. The only Ethical hacker i guarantee to talk about employ instead of being victims the expertise as world class, also helped recover all the funds i was ripped off.

    Reply
  13. Benedict Carver
    Benedict Carver says:

    Good news — I got back 160,870 of my BITCOIN that was stolen in an investment scam! 🙌 Huge thanks to Brunoe Quick Hack, and the team who worked with me and law enforcement to trace and recover the funds. Whats-APP +(1) 70578-42635
    If you ever face something similar: don’t panic, keep every message and transaction record, and get help from verified pros — scams can be beaten when you act fast and use the right channels. Email: BrunoeQuickHackATgmail.com

    Reply
  14. Mary Jordan
    Mary Jordan says:

    Marriage is sweet, Love is also sweet but i don’t see why after getting married to my dream man he still cheated on me with his EX girlfriend though i had try breaking into his IPHONE since last year but still not getting access to his phone since then i just try to swallow all my husband had been doing but i can’t take it any more so i came in contact to gmail of jbeespyhack @gmail com, with his help I had access to my husband’s phone without touching his phone. I had full information of his chats with his ex-girlfriend last year. With all I saw, I don’t think I can move on with the marriage. He went as far as telling the girlfriend that I have been his wrong & i beat her up almost everyday. I was so disappointed & I called off the marriage.. and jbeespyhack@gmail com and you can text him your request

    Reply
  15. Elisha Paquin
    Elisha Paquin says:

    HOW TO HIRE A HACKER TO RECOVER STOLEN BITCOIN..
    Dune Nectar Web Expert assists individuals and organisations in promptly and compassionately recovering misplaced or misappropriated funds. Our team comprises experienced specialists in financial recovery, fraud investigation, and client advocacy, with strong customer ratings on Google Reviews and Trustpilot. Each case is handled urgently, empathetically, and results-oriented.
    Email: “Support (@) Dunenectaronlineexpert . Com”
    W/A: https://wa.link/3gfxoy

    Reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *