Calendar icon
Tuesday 19 May, 2026
Weather icon
á Dakar
Close icon
Se connecter

"Is Senegal a target?": How hackers are shaking our strategic institutions

Auteur: Léna THIOUNE

image

"Le Sénégal est-il une cible ?" : comment des hackers font trembler nos institutions stratégiques

Following the DGID (General Directorate of Taxes and Duties), the DAF (Directorate of Finance and Administration), and now the Treasury, which has been gradually regaining its payment and collection services since Monday, May 18, cyberattacks targeting strategic Senegalese institutions are no longer isolated incidents. The repeated intrusions, striking at the heart of the state's fiscal, administrative, and financial data, are now fueling a more worrying question: Is Senegal becoming a prime target in cyberspace? Seneweb gathered expert opinions to understand this phenomenon.

In recent months, several sensitive platforms and structures have been disrupted or exposed to suspected data leaks. The latest attack targeting the Treasury, with reports of nearly 70 gigabytes of potentially compromised data, has reignited concerns about the government's ability to protect its digital infrastructure. According to the experts interviewed, this recurring pattern primarily reflects structural weaknesses in cybersecurity governance.

For Gérard Joseph Francisco Dacosta, a cybersecurity and digital sovereignty strategist, who reminds us that "100% security doesn't exist. Even major powers are attacked," a system's vulnerability isn't measured solely by its ability to prevent intrusion, but primarily by its capacity to quickly detect an attack, limit the damage, and restore services. "The real problem in Senegal is resilience. When a system fails, how do we get it back up and running? Do we know if an intruder is already in the system? Are we properly monitoring the infrastructure?" he asks.

The expert believes that Senegalese public administrations are lagging behind in continuous network monitoring, intrusion detection, and incident recovery plans. These shortcomings make institutions more vulnerable to increasingly sophisticated cybercriminals.

Criminal attacks or destabilization operations?

No official claim of responsibility has yet clearly identified the perpetrators of the attack against the French Treasury, although the institution stated in a press release published on Monday, May 18, that "the technical analyses carried out at this stage confirm that this incident resulted from malicious acts." Several theories are being considered. Gérard Dacosta believes two scenarios remain plausible. "Either certain groups are practicing before targeting more sensitive targets, or there is an attempt at destabilization," he suggests. The expert, however, urges caution regarding certain figures circulating about the volume of data allegedly stolen. According to him, some groups also exploit "psychological pressure" to increase the pressure on their victims and enhance their visibility.

For Gallo Fall, a US-based cybersecurity expert, recent attacks bear the hallmarks of criminal groups specializing in ransomware. "These attacks are often motivated by financial interests," he explains, citing examples of systems being blocked for ransom or data being resold on the dark web. In this regard, he considers the possibility of a massive data leak from the Treasury particularly worrying. According to him, 70 gigabytes could represent "millions of documents" containing budget information, public contracts, bank details, or even salary payments.

“Once disseminated on the dark web, this data can be exploited for years by fraudsters or criminal networks,” he warns. The expert emphasizes that the consequences extend far beyond the administrative sphere. Compromised data can be used for identity theft, targeted phishing campaigns, or even the creation of fake administrative documents. Therefore, the critical infrastructure protection expert also calls on authorities to communicate more effectively after this type of incident. “After a cyberattack, citizens must be informed, explained, and told what measures are being taken,” he asserts.

Digitalization is outpacing security.

For both experts, the increase in attacks is also a direct consequence of the accelerated digital transformation of the state. Online payments, tax platforms, digitized public procurement, and paperless administrative services are all advances that mechanically increase the attack surface. "The more you digitize, the more vulnerable you become," summarizes Gérard Dacosta. According to him, every additional connection, every device or network used by public employees represents a potential entry point for attackers.

Gallo Fall speaks of a "paradox of digitalization." "The faster you digitize without securing it, the more sovereignty you lose," he says. "Every new, poorly secured digital system becomes an extension of the attack surface for adversaries." He criticizes the use of outdated systems, insufficiently secure access protocols, and a lack of strategic foresight in public digital projects. "A great deal of strategy is needed in terms of monitoring, detection, access control, political governance, employee training and awareness, and also background checks on service providers. Because we cannot depend, for example, on foreign providers," he argues.

The sensitive issue of foreign service providers

Beyond the technical shortcomings, several questions also arise regarding Senegal's dependence on foreign technologies and service providers.

Gallo Fall believes the country must strengthen its control over critical infrastructure and the encryption keys used to protect sensitive data. He cites the DAF precedent where, according to him, some security keys were controlled by an external provider. "Foreign technologies can be used, but they must be mastered, and strategic control must be maintained," he insists.

Gérard Dacosta shares this position, believing that digital sovereignty does not mean rejecting international technologies, but rather enabling Senegalese engineers to understand, manage and secure these tools without systematically relying on foreign experts.

The risk of a loss of trust

Experts believe that the consequences of repeated attacks could become economic and political. A digital administration perceived as vulnerable risks undermining citizens' trust in public platforms, as well as that of international partners. "If the systems that produce financial or budgetary data are compromised, it raises a credibility issue," warns Gallo Fall.

Gérard Dacosta, for his part, fears a scenario of widespread paralysis comparable to that experienced by Estonia in 2007 after a series of massive cyberattacks. "We could wake up one day to find public platforms blocked, services disrupted, and a country digitally paralyzed," he warns. They are therefore calling for cybersecurity to be made a national strategic priority, on par with defense or territorial security.

Train, retain and mobilize local talent

Faced with the rise of cyber threats, experts are finally calling for massive investment in local skills. Both agree that Senegal already has qualified professionals, but struggles to retain them or offer them an attractive working environment. "Many engineers have left for other countries due to insufficient conditions," laments Gérard Dacosta, who calls for the creation of a stable and rewarding environment for digital specialists.

Gallo Fall also emphasizes the need to involve the Senegalese diaspora more in national cybersecurity strategies. “There are Senegalese experts all over the world who can help the country,” he states. They believe that Senegal will not be able to sustainably protect its digital infrastructure without building a genuine national cybersecurity doctrine, based on prevention, technological sovereignty, and the development of strong local expertise.

Auteur: Léna THIOUNE
Publié le: Mardi 19 Mai 2026

Commentaires (7)

  • image
    Leuk il y a 10 heures
    C'est grave ! Pire que la menace d'AQMI et autres
  • image
    Darkpenguin il y a 10 heures
    Le problème fondamental réside dans la façon qu'a été mis en œuvre du réseau " BACKBONE NETWORK" national dorsal en fibre optique pour la diffusion de l'internet sous l'égide de la multinationale française Orange qui sert exclusivement ses propres intérêts, sans être couplée à un réseau intranet parallèle déconnecté d'Internet. Or, ce réseau intranet est essentiel à la sécurité des communications de l'État et de ses entités constituantes, compte tenu des exigences de sécurité insuffisantes et de l'importance administrative d'un intranet national. L'ensemble du projet de réseau dorsal national, connecté à Internet et utilisé pour les communications administratives, est aujourd'hui remis en question en raison de sa vulnérabilité démontrée par ces cyberattaques. À mon avis, il doit être entièrement repensé, car nos communications ont été simplifiées à l'extrême pour servir les intérêts financiers de la multinationale française Orange. La solution consiste à refondre le système existant et à mettre en place un nouveau réseau national parallèle en fibre optique pour l'intranet administratif à ses côtés. Ce réseau, non accessible par Internet, devrait s'appuyer sur le tracé du réseau national de fibre optique existant et servir d'intranet pour l'administration et les secteurs sensibles. Il aurait dû être planifié et mis en œuvre dès le départ, en parallèle des travaux sur le réseau dorsale national de fibre optique.
  • image
    Mofaye il y a 9 heures
    Comme les dirigeants n'ont pas comprs que un pays se protege et tout etranger doit etre sous controle et sans cela le pays ne peut pas etre en securite! C tout juste une trahison de leur serment de securiser ce pays....les gens doivent sortir maniffester massivement!
  • image
    Xeme il y a 2 heures
    ..C'est toute l'Afrique qui est une cible de la France, sauf parmis eux ceux qui ont accepté de se coucher.
  • image
    Goudron il y a 1 heure
    Nous sommes dirigés par un régime poisseux composé d'incompétents et de beaux parleurs. 86 jeunes sénégalais sont morts dans les manifestations à cause des mensonges et de la manipulation de leur gourou. Ils avaient promis de rendre justice aux morts mais rien n'a été fait. C'est le karma qui s'abat sur eux. Ils ne réussiront rien du tout. Ils ont fait trop de mal pour accéder au pouvoir. Rien ne va... Économie bloquée Agriculture zéro Horticulture et maraîchage zéro Éducation nationale zéro Pêche zéro Tourisme mourant Cyber-Securité zéro BTP zéro Zéro réalisation
  • image
    Assane il y a 1 heure
    Pourquoi chercher la France comme cible et pourtant eux aussi ils sont la proie des cybers, vous savez bien c'est comme les trafiquants là y a des failles ça essaient de rentrer.
  • image
    Nandite. il y a 33 minutes
    Il faut oser le dire : au Sénégal, dans certains secteurs qui brassent beaucoup d’argent, les données ne sont pas gérées par de véritables experts, mais plutôt par une sorte de mafia, parce que ces postes sont très rémunérateurs. Aux impôts et domaines, au Trésor, à la Douane, etc., les personnes qui gèrent les données sont souvent des promotionnaires ou des diplômés issus des mêmes écoles de Colobane (ENA ou CFJ). Comme ces postes offrent de nombreux avantages, cette “mafia” fait tout pour qu’un des leurs parfois sans réelle expertise soit nommé à leur tête. Il faut laisser la place aux véritables experts en informatique, au lieu de confier ces postes stratégiques à des pseudo-informaticiens. Comment un pur littéraire peut-il gérer efficacement des données informatiques complexes ?

Participer à la Discussion

Règles de la communauté :

  • Soyez courtois. Pas de messages agressifs ou insultants.
  • Pas de messages inutiles, répétitifs ou hors-sujet.
  • Pas d'attaques personnelles. Critiquez les idées, pas les personnes.
  • Contenu diffamatoire, vulgaire, violent ou sexuel interdit.
  • Pas de publicité ni de messages entièrement en MAJUSCULES.

💡 Astuce : Utilisez des emojis depuis votre téléphone ou le module emoji ci-dessous. Cliquez sur GIF pour ajouter un GIF animé. Collez un lien X/Twitter, TikTok ou Instagram pour l'afficher automatiquement.