An Overview of Hacking as a Service (HaaS) in Africa

Mboungou Mouyabi Seke*
University of the Witwatersrand, Johannesburg, Gauteng, South Africa.
Periodicity:January - June'2025
DOI : https://doi.org/10.26634/ijwt.14.1.21834

Abstract

Hacking as a Service (HaaS) in Africa presents a growing concern, marked by the increasing availability of cybercrime tools and services. This emerging model exploits diverse socio-economic factors, leading to enhanced access for individuals and groups to perpetrate cyberattacks without substantial technical expertise. The prevalence of cybercrime powered by HaaS threatens the economic stability, security, and privacy of individuals and businesses across the continent. Despite advancements in internet penetration and digital adoption, many African nations remain inadequately prepared to combat these rising threats, exacerbating the vulnerability of their digital environments. The significance of this work lies in addressing the multi-dimensional implications of HaaS on African societies. By undertaking a comprehensive overview, this paper aims to illuminate the various facets of HaaS, including its operational mechanics, associated risks, and the socio-economic contexts that facilitate its proliferation. Furthermore, it seeks to identify strategic recommendations for mitigating these threats and fortifying cybersecurity measures. Ultimately, understanding the nuances of HaaS will aid policymakers, businesses, and civil society in fostering a more secure digital landscape conducive to economic growth and social development.

Keywords

HaaS, Cybersecurity, Cybercrime, Underground Markets, Digital Threats.

How to Cite this Article?

Seke, M. M. (2025). An Overview of Hacking as a Service (HaaS) in Africa. International Journal of Web Technology, 14(1), 28-40. https://doi.org/10.26634/ijwt.14.1.21834

References

[1]. Abbey, E. D. (2024). Impact of Digital Transformation on Cybersecurity in African Businesses (Doctoral dissertation, St. Thomas University).
[4]. Amoo, O. O., Atadoga, A., Abrahams, T. O., Farayola, O. A., Osasona, F., & Ayinla, B. S. (2024). The legal landscape of cybercrime: A review of contemporary issues in the criminal justice system. World Journal of Advanced Research and Reviews, 21(2), 205-217.
[5]. Appiah, T., & Agblewornu, V. V. (2025). The Interplay of Perceived Benefit, Perceived Risk, and Trust in Fintech Adoption: Insights from Sub-Saharan Africa. Heliyon.
[9]. Buil-Gil, D., & Barrett, E. (2022). The dynamics of business, cybersecurity and cyber-victimization: Foregrounding the internal guardian in prevention. In The New Technology of Financial Crime (pp. 5-34). Routledge.
[12]. Chibanda, R., & Kabanda, S. (2022). Towards an African cybersecurity community of practice. In Proceedings of 43rd Conference of the South African Institute of Computer Scientists and Information Technologists, 85, 1-14.
[16]. Farok, N. A. Z., & Zolkipli, M. F. (2024). Incident response planning and procedures. Borneo International Journal, 7(2), 69-76.
[17]. Grobbelaar, A. (2022). Cyberterrorism in Africa – Exaggerated Threat or Worthy Foe? Freska.
[23]. Jarkas, O., Ko, R., Dong, N., & Mahmud, R. (2025). A Container Security Survey: Exploits, Attacks, and Defenses. ACM Computing Surveys.
[28]. Mwita, P. S., & Mhina, J. R. A. (2023). Assessing the effectiveness of the implementation of cybercrimes mitigation strategies in selected commercial banks in Tanzania. European Journal of Theoretical and Applied Sciences, 1, 571-83.
[32]. Maluleke, W. (2023). Exploring cybercrime: An emerging phenomenon and associated challenges in Africa. International Journal of Social Science Research and Review, 6(6), 223-243.
[33]. Maphumulo, W. T., & Bhengu, B. R. (2019). Challenges of quality improvement in the healthcare of South Africa post-apartheid: A critical review. Curationis, 42(1), 1-9.
[35]. Mokofe, W. M. (2023). Digital transformations of the South African legal landscape. Journal of Digital Technologies and Law, 1(4), 1087-1104.
[41]. Pamuk, M. (2025). Finding Path towards AI-Based Services in the Finance Industry (Doctoral Dissertation, Georg-August-Universität Göttingen).
[43]. Plachta, M., Hong, E., & Wahl, A. (2024). Transnational organized crime and economic integration. Intelligent Earth Leakage Relay (IELR), 40, 416.
[46]. Raza, S. A., Syed, D., Rizwan, S., & Ahmed, M. (2025). The use of data in financial services. In The Global Evolution, Changing Landscape and Future of Financial Markets: From Traditional to Digital (pp. 47–57). Emerald Publishing Limited.
[50]. Shah, A. (2024). Cybercrime chronicles: Exploring the evolving landscape of challenges in the digital era. A Global Journal of Humanities (pp. 20-24).
[53]. Temara, S. (2024). The dark web and cybercrime: Identifying threats and anticipating emerging trends. International Journal of Advanced Engineering Research and Science (IJAERS), 11 (10), 80-93.
[54]. Thomas, G., & Sule, M. J. (2023). A service lens on cybersecurity continuity and management for organizations' subsistence and growth. Organizational Cybersecurity Journal: Practice, Process and People, 3(1), 18-40.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 35
Online 15 15 200 35
Pdf & Online 35 35 400 35

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.