Having been based back in South Africa for the past year, I have seen a shift in how cybercriminals operate, particularly across emerging markets. Artificial intelligence (AI) and open-source intelligence (OSINT) tools are empowering both defenders and attackers, but the balance has tipped in favour of those with illicit intent. Microsoft’s Cyber Signals report, drawing on trillions of security signals worldwide, warns that this new landscape is “particularly concerning” for South Africa and the broader African continent. Cybercriminals now deploy AI as a force multiplier – using deepfakes, realistic chatbots, and other tricks to make scams more persuasive – while OSINT (publicly available data) lets them profile victims with frightening precision.
Today’s cybercriminals range from organised syndicates and traffickers to fraud rings, and all are using AI and public data to mimic, manipulate, and deceive at scale. And they’re not alone; shareholder activists, environmental campaigners, and corporate agitators are using the same OSINT tools to identify and pressure CEOs and senior executives. In 2024, a record 27 CEOs resigned following activist campaigns – a 170% increase since 2020. While shareholder activism serves legitimate purposes, the same digital intelligence techniques that enable productive engagement can also fuel harassment campaigns, doxing, and coordinated pressure that spills from the boardroom into executives’ personal lives.
A contact in Cape Town recently discovered his own family was being openly monitored. The people tracking them knew his children’s names and schools, his wife’s car, and their daily routines – all gleaned from social media posts, LinkedIn updates and geotagged photos. (They even mapped the family’s hiking route and favourite coffee shop from check-in data.) The family is safe, but this episode was a stark reminder: an online presence can directly enable real-world threats.
An attack can occur anywhere around the world. In late 2024, the CEO of Canadian crypto firm WonderFi was abducted in downtown Toronto during rush hour and released after paying a $1 million ransom. In January 2025, the co-founder of the Ledger crypto firm and his wife were kidnapped at gunpoint in France – both were freed by authorities within a day. Mexico reported roughly 85 kidnappings per month in 2024. And beyond kidnapping, sophisticated fraud schemes are exploding – business email compromise (BEC) attacks on executives, romance scams that bankrupt victims, and human-trafficking rings operating under the cover of fake employment agencies are all on the rise globally.
In South Africa, the situation is even more acute. Figures from the South African Police Service (SAPS) show 17,061 kidnappings in 2023/24 – a 264% increase over ten years. That works out to nearly 47 abductions per day on average. The trend is accelerating; according to the SAPS, kidnapping cases have surged in 2025. From January to March alone, 4,571 cases were reported, an increase of 6.8% compared to the same period in 2024. That means, on average, 51 people are abducted every day in South Africa.
What makes these statistics particularly troubling is the sophistication behind the attacks. Business executives are being systematically targeted by hostile actors and organised crime syndicates who use OSINT to identify high-value targets, then conduct surveillance to establish patterns. For example, since January 2023 there have been at least 20 Portuguese butchery owners and staff kidnapped for ransom in Gauteng, and in just the first half of last year, a law-enforcement task force rescued 12 businessmen and six students who had been abducted. These are not random street crimes; they are intelligence-driven operations that begin weeks before any physical contact.
AI is now a force multiplier for hostile actors and criminals. Microsoft reports disrupting billions of dollars’ worth of AI-powered fraud attempts worldwide between April 2024 and April 2025. We see deepfake videos of CEOs ‘authorising’ fraudulent wire transfers, AI-cloned voices pretending to be family members in distress, and completely AI-generated job postings that look utterly legitimate.
The frightening truth is that hostile actors can now map out our lives in advance using digital breadcrumbs. They identify high-net-worth individuals through open sources: LinkedIn profiles, news articles, property registries, company filings, conference attendee lists, and more. Your social media post about a job promotion, a friend’s Instagram photos of your holiday home, or your spouse’s Facebook check-ins at upscale spots all feed the profile. By the time any real-world surveillance begins, the online research has already answered half the questions. Geotagged family photos pinpoint your home; posts about your child’s school reveal its name; cafe check-ins show your morning routes. Those are just confirmations of what was already on the computer screen.
Understanding what’s already out there
Most people don’t realise how far their ‘public profile’ extends. In our digital audits we look far beyond just Facebook and LinkedIn. We examine official records, property databases, archived web pages, data breaches on the dark web, even facial-recognition matches in open-image search.
I’ve seen families stunned by what’s out there. Information they assumed was private – home addresses, school locations, old social posts they forgot they posted – was sitting in the public domain, accessible to anyone who knows where to look. Each piece of data seems harmless by itself – but together they create a detailed ‘operational blueprint’ for attackers. Once personal data is online, it is extremely hard to erase. The question isn’t “what harm could come from sharing this?” so much as “why was it ever public?” Knowing your full digital footprint – not just what you post, but what others post about you, what appears in databases, and what’s archived – is the first step in any effective security strategy.
The Five A’s: a structured defence framework
In this rapidly evolving landscape, families and firms need a structured approach to remain secure. We have found the Five A’s framework particularly helpful:
What this means going forward
The threat landscape is evolving faster than most security protocols can keep up. Criminals are using AI to produce convincing deepfakes, leveraging OSINT to build detailed target profiles, and employing sophisticated strategies that eliminate many traditional warning signs.
This information isn’t meant to frighten you – it’s meant to inform you. The statistics demand response: 51 people kidnapped daily in South Africa alone, ransom demands increasing globally, systematic targeting of business executives across multiple continents, and trafficking operations disguised as legitimate employment.
What separates successful security outcomes from catastrophic ones isn’t luck. It’s preparation, awareness, and a willingness to fundamentally rethink how we approach personal and corporate security in the digital age.
The families and firms successfully navigating these challenges understand their complete digital footprint, have systematically reduced unnecessary exposure, and have shaped the narrative to ensure the right information lives in the right places. They’ve trained their people, implemented layered controls, and built strong networks.
Safeguarding the wealthy and their networks today requires a truly global view. The accelerated use of AI means attackers can generate bespoke content at scale, and publicly available data means nothing is ‘too obscure’ to find. Africa’s distinctive digital environment – mobile-first, socially networked, and lightly regulated – simply adds more avenues for attackers to explore. By understanding these regional nuances and extending our defences accordingly, we stay a step ahead.
Your security posture must be as sophisticated as the threats you face. And as sophisticated as those threats are, they can begin with a simple online search.
Privacy Policy.
Revoke consent.
© Digitalis Media Ltd. Privacy Policy.
Digitalis
We firmly believe that the internet should be available and accessible to anyone, and are committed to providing a website that is accessible to the widest possible audience, regardless of circumstance and ability.
To fulfill this, we aim to adhere as strictly as possible to the World Wide Web Consortium’s (W3C) Web Content Accessibility Guidelines 2.1 (WCAG 2.1) at the AA level. These guidelines explain how to make web content accessible to people with a wide array of disabilities. Complying with those guidelines helps us ensure that the website is accessible to all people: blind people, people with motor impairments, visual impairment, cognitive disabilities, and more.
This website utilizes various technologies that are meant to make it as accessible as possible at all times. We utilize an accessibility interface that allows persons with specific disabilities to adjust the website’s UI (user interface) and design it to their personal needs.
Additionally, the website utilizes an AI-based application that runs in the background and optimizes its accessibility level constantly. This application remediates the website’s HTML, adapts Its functionality and behavior for screen-readers used by the blind users, and for keyboard functions used by individuals with motor impairments.
If you’ve found a malfunction or have ideas for improvement, we’ll be happy to hear from you. You can reach out to the website’s operators by using the following email webrequests@digitalis.com
Our website implements the ARIA attributes (Accessible Rich Internet Applications) technique, alongside various different behavioral changes, to ensure blind users visiting with screen-readers are able to read, comprehend, and enjoy the website’s functions. As soon as a user with a screen-reader enters your site, they immediately receive a prompt to enter the Screen-Reader Profile so they can browse and operate your site effectively. Here’s how our website covers some of the most important screen-reader requirements, alongside console screenshots of code examples:
Screen-reader optimization: we run a background process that learns the website’s components from top to bottom, to ensure ongoing compliance even when updating the website. In this process, we provide screen-readers with meaningful data using the ARIA set of attributes. For example, we provide accurate form labels; descriptions for actionable icons (social media icons, search icons, cart icons, etc.); validation guidance for form inputs; element roles such as buttons, menus, modal dialogues (popups), and others. Additionally, the background process scans all of the website’s images and provides an accurate and meaningful image-object-recognition-based description as an ALT (alternate text) tag for images that are not described. It will also extract texts that are embedded within the image, using an OCR (optical character recognition) technology. To turn on screen-reader adjustments at any time, users need only to press the Alt+1 keyboard combination. Screen-reader users also get automatic announcements to turn the Screen-reader mode on as soon as they enter the website.
These adjustments are compatible with all popular screen readers, including JAWS and NVDA.
Keyboard navigation optimization: The background process also adjusts the website’s HTML, and adds various behaviors using JavaScript code to make the website operable by the keyboard. This includes the ability to navigate the website using the Tab and Shift+Tab keys, operate dropdowns with the arrow keys, close them with Esc, trigger buttons and links using the Enter key, navigate between radio and checkbox elements using the arrow keys, and fill them in with the Spacebar or Enter key.Additionally, keyboard users will find quick-navigation and content-skip menus, available at any time by clicking Alt+1, or as the first elements of the site while navigating with the keyboard. The background process also handles triggered popups by moving the keyboard focus towards them as soon as they appear, and not allow the focus drift outside of it.
Users can also use shortcuts such as “M” (menus), “H” (headings), “F” (forms), “B” (buttons), and “G” (graphics) to jump to specific elements.
We aim to support the widest array of browsers and assistive technologies as possible, so our users can choose the best fitting tools for them, with as few limitations as possible. Therefore, we have worked very hard to be able to support all major systems that comprise over 95% of the user market share including Google Chrome, Mozilla Firefox, Apple Safari, Opera and Microsoft Edge, JAWS and NVDA (screen readers), both for Windows and for MAC users.
Despite our very best efforts to allow anybody to adjust the website to their needs, there may still be pages or sections that are not fully accessible, are in the process of becoming accessible, or are lacking an adequate technological solution to make them accessible. Still, we are continually improving our accessibility, adding, updating and improving its options and features, and developing and adopting new technologies. All this is meant to reach the optimal level of accessibility, following technological advancements. For any assistance, please reach out to webrequests@digitalis.com