SA’s strained, loadshedding-prone grid faces cyberthreats

Issue 3 2025 Power Management, Information Security

South Africa’s energy sector, already battered by decades of underinvestment and loadshedding, faces another escalating crisis; a wave of cyberthreats that could turn disruptions into catastrophic failures. Attacks are already happening internationally.

As Eskom and a growing pool of independent power producers (IPPs) digitise their operations, integrate renewables into the grid, and roll out smart meters, the country’s energy infrastructure is becoming a high-value target – and a dangerously vulnerable one.

Loadshedding and cyber risk

South Africa’s ongoing loadshedding crisis significantly increases the risk and potential impact of even smaller cyberattacks on the grid. A report on the UK and EU energy sector recently published by KnowBe41, painted a picture of a worryingly active siege on critical infrastructure growing worldwide.

As disconcerting as the risks to grids are with cyberattacks increasing, the consequences are even more dire for grids that are already struggling.

Energy infrastructure under stress is far less resilient to additional shocks. According to the Council for Scientific and Industrial Research (CSIR), in a 2024 survey2, 88% of South African organisations experienced at least one data breach in the past year​, and almost half reported multiple incidents.​ The energy sector is firmly within this trend, with phishing emails and social engineering remaining primary entry points for attackers, including attempts to trick energy company staff into clicking malicious links3.

During loadshedding, utilities rely on intricate, real-time load balancing across increasingly fragile networks. Cyberattacks exploiting this fragility, such as mass smart meter disconnects or fake load signals, would require far less effort to trigger instability or cascading failures than would be required to destabilise stable grids where supply is not constrained.

International case studies validate these fears, with KnowBe4’s 2025 EU Energy Report emphasising the cyber battlefield emerging around European utilities. In 2023, the International Energy Agency noted at an event in Paris that cyberattacks on EU utilities had more than doubled between 2020 and 2022, with attackers increasingly targeting operational technologies. The same vulnerabilities are being introduced locally as South Africa races to install more remotely controllable infrastructure.


Martin Kraemer.

The underestimated weak link: Smart meters

South Africa’s rollout of smart prepaid meters by Eskom and municipalities is meant to modernise revenue collection and demand management, but Deloitte South Africa4 found that IoT-style devices introduce a slew of new cybersecurity risks​.

Smart meters are not inherently unsafe. New models use encryption protocols based on the Standard Transfer Specification (STS), with tamper detection and secure firmware updates. However, real-world breaches reveal that it is not always the meters themselves, but the backend systems that are compromised:

• In 2022, Eskom’s online token vending platform was breached internally, allowing illicit prepaid electricity tokens to be generated​.

• In 2019, City Power’s IT systems were crippled by ransomware, preventing customers from topping up their prepaid electricity​

• Researchers globally have simulated attacks5 in which compromised smart meters could trigger load oscillations, overwhelming substations and even entire energy grids.

These findings echo international concerns. The eFORT project, funded by the EU, found that manipulation of distributed energy devices, like smart meters and EV chargers, could trigger widespread outages​. In South Africa, where loadshedding already forces dynamic rebalancing of supply and demand, even a small-scale coordinated cyberattack on smart meters could have outsized effects.

Renewable expansion adds risks

The UK and EU experiences show that rapid decentralisation and renewable energy growth increase cyber risk. Europe's shift to renewables has been accompanied by attacks on wind farms and solar installations, with 5800 turbines in Germany knocked offline due to a cyber disruption in 2022​.

South Africa’s own decentralisation through independent power producers (IPPs) and the reliance on remote monitoring of solar photovoltaic farms and wind facilities​ replicate these vulnerabilities. Experts warn that many renewable energy operators lack robust cybersecurity postures. Even small gaps, such as using default passwords on control dashboards, can allow hackers to hijack systems​.

This risk is magnified by geopolitical factors; while South Africa’s geopolitical alignment means it may not be a direct target, there is a growing concern that local infrastructure could be collateral damage or a testing ground​ for state-sponsored hackers, much as Ukraine’s grids were before the full-scale conflict began​.

Skills shortages

Compounding the technical vulnerabilities is a severe shortage of cybersecurity skills. The CSIR reports that 63% of cybersecurity roles in South African companies are unfilled or only partially filled. At the same time, only 32% of companies train a majority of their employees in cybersecurity​, leaving the door wide open for phishing and social engineering attacks, which are still the top entry points into critical systems​.

The exploitation of the human element is especially dangerous in energy infrastructure, where compromising just one employee’s credentials could provide a bridge into operational networks​.

Resilience cannot wait

While South Africa has moved to introduce protections, such as the Critical Infrastructure Protection Act of 2019​, enforcement and operational readiness lag behind. As of late 2023, no major energy sites had been officially designated under the act, according to the last public update from the government. Building resilience must move from legislation to practical implementation:

• Critical sites must be formally designated and fortified, both digitally and physically.

• Utilities must secure smart meter backends better, encrypt communications end-to-end, and segment operational networks from administrative systems.

• Incident response plans must explicitly include cyberattack scenarios during loadshedding periods, not just normal operations.

• Real-time monitoring and anomaly detection must be mandatory for all IPPs connected to the grid.

• Ongoing security awareness training must be prioritised, particularly for frontline energy workers.

“The protection of critical infrastructure is paramount, as the research highlights how cyberattacks can cause widespread disruption across the energy sector, impacting everything from power generation to distribution. The need for continuous education, investment in threat detection technologies, and cross-border collaboration to safeguard power infrastructure against escalating cyberthreats has never been clearer.”

As Europe’s energy security crises have demonstrated​, cyber resilience is no longer an IT issue, it is a national security imperative. For South Africa, where supply is already fragile, the consequences of inaction could be devastating. Fortifying the grid against cyberattacks is now as important as physically fortifying power stations themselves.

[References]

1 tinyurl.com/mr3nw7mu

2 tinyurl.com/49ebv2kx

3 tinyurl.com/23sba88f

4 tinyurl.com/4mxewwzx

5 tinyurl.com/bddzwc7t




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Remote solar farm monitoring
Power Management Logistics (Industry)
Ensuring solar farm installations operate at peak efficiency is no small feat. Owners need real-time insights into their installation’s performance to meet energy delivery targets and manage billing.

Read more...
Almost 50% of companies choose to pay the ransom
News & Events Information Security
This year’s Sophos State of Ransomware 2025 report found that nearly 50% of companies paid the ransom to get their data back, the second-highest rate of ransom payment for ransom demands in six years.

Read more...
Back-up securely and restore in seconds
Betatrac Telematic Solutions Editor's Choice Information Security Infrastructure
Betatrac has a solution that enables companies to back-up up to 8 TB of data onto a device and restore it in 30 seconds in an emergency, called Rapid Access Data Recovery (RADR).

Read more...
Phishing attacks through SVG image files
Kaspersky News & Events Information Security
Kaspersky has detected a new trend: attackers are distributing phishing emails to individual and corporate users with attachments in SVG (Scalable Vector Graphics) files, a format commonly used for storing images.

Read more...
The impact of GenAI on cybersecurity
Sophos News & Events Information Security
Sophos survey finds that 89% of IT leaders worry GenAI flaws could negatively impact their organisation’s cybersecurity strategies, with 87% of respondents stating they were concerned about a resulting lack of cybersecurity accountability.

Read more...
Efficient, future-proof estate security and management
Technews Publishing ElementC Solutions Duxbury Networking Fang Fences & Guards Secutel Technologies OneSpace Technologies DeepAlert SMART Security Solutions Editor's Choice Information Security Security Services & Risk Management Residential Estate (Industry) AI & Data Analytics IoT & Automation
In February this year, SMART Security Solutions travelled to Cape Town to experience the unbelievable experience of a city where potholes are fixed, and traffic lights work; and to host the Cape Town SMART Estate Security Conference 2025.

Read more...
Seven tips to help ensure your backup batteries work
Power Management Security Services & Risk Management
Load shedding is back, officially or not. Lance Dickerson offers seven tips to prolong the life of your power backup systems and ensure they perform as intended when needed.

Read more...
Identity is a cyber issue
Access Control & Identity Management Information Security
Identity and access management telemetry has emerged as the most common source of early threat detection, responsible for seven of the top 10 indicators of compromise leading to security investigations.

Read more...
Identity and authentication
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security Security Services & Risk Management
Identity authentication is a crucial aspect of both physical security and cybersecurity. SMART Security Solutions obtained insights into the topic and the latest developments from three companies.

Read more...
Smart surveillance and cyber resilience
Axis Communications SA Surveillance Information Security Government and Parastatal (Industry) Facilities & Building Management
South Africa’s critical infrastructure sector has to step up its game regarding cybersecurity and the evolving risk landscape. The sector has become a prime target for cybercriminals on top of physical threat actors, and the consequences of an incident can be far-reaching.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.