Cyber threats loom over Senegal’s public treasury amid digital shift

Cyber threats loom over Senegal’s public treasury amid digital shift

The Senegalese Public Treasury has become the latest victim of a cyberattack, deepening concerns in Dakar over the nation’s digital security landscape. Within just six months, three critical government agencies have faced breaches, thrusting cybersecurity into the spotlight of Senegal’s digital sovereignty debate. This surge in intrusions coincides with the state’s accelerated push toward digitalizing public services, inadvertently expanding the attack surface for malicious actors. The frequency of these incidents raises serious questions about the resilience of the safeguards protecting the country’s most sensitive infrastructure.

The attack on the General Directorate of Treasury and Public Accounting follows two earlier high-profile breaches. In October, the tax and land registry portal was compromised. Then, in January, the agency responsible for national identity card production suffered an intrusion, disrupting a system that directly impacts citizens’ daily lives. These successive attacks paint a worrying picture: taxes, civil registration, and public finances—core functions of the administrative apparatus—are under siege.

Rushed digitalization outpaces security measures

Like many African nations racing to modernize their governments, Senegal has launched numerous digital initiatives without adequately pairing them with robust security frameworks. The push for digital public services, touted as a tool for efficiency and transparency, demands substantial investments in data protection, continuous monitoring, and staff training. The gap between the pace of digital transformation and the strengthening of defenses is precisely the vulnerability cybercriminals exploit. Attackers typically pursue three objectives: extortion via ransomware, theft and resale of sensitive data, or symbolic disruption of state institutions. In the case of the Treasury—a repository of the state’s financial flows—the stakes are far higher. A prolonged breach could disrupt public expenditure chains, tracking of local government accounts, or even domestic debt management. Authorities have not yet disclosed the exact nature of the intrusion or the potential scale of data exfiltration.

Africa emerges as a prime target for cybercriminals

Senegal is not alone. Over the past two years, multiple African countries pursuing ambitious e-government programs have fallen victim to large-scale cyber offensives. The proliferation of internet connectivity, the rise of mobile payments, and the gradual migration of public records to cloud platforms have created an environment ripe for exploitation by cybercriminals, whether operating locally or abroad. The cost-benefit ratio remains skewed in favor of attackers: ransom demands are lucrative, while the likelihood of cross-border legal consequences remains minimal.

Despite Dakar’s institutional framework—including the Personal Data Protection Commission (CDP) and initiatives led by the State IT Agency (ADIE)—critical gaps persist. Operational coordination between agencies, incident response capabilities, and cybersecurity awareness among public servants remain works in progress. The escalation in attacks may force the adoption of a stricter national strategy, incorporating regular audits, simulated attack drills, and stricter breach notification requirements.

Political fallout and the path forward

The government faces a growing political challenge. Public trust in digitalized public services hinges on the assurance that sensitive data—tax, biometric, and financial—remains secure. Three major breaches in six months erode this trust and undermine the case for continued large-scale digital projects. Pressure is also mounting on private contractors working with the state, where cost often trumps security in procurement decisions.

Beyond Senegal, these cascading attacks underscore a stark reality: African digital sovereignty cannot be reduced to localized data hosting or the development of national software. True sovereignty requires real capabilities—detection, containment, and neutralization—of increasingly sophisticated cyber intrusions.

theafricantribune