Scam Alerts
Active threats targeting Ghanaians right now. Sourced from CSA Ghana advisories and verified reports.
5
Active
6
Tracked
1
Reports
Active Threat Matrix
CSA Ghana · Updated 2026
AI Voice Cloning (MoMo)
RISINGScammers use AI to clone voices of family members, calling relatives to urgently request emergency MoMo transfers.
Who's targeted
Relatives of MoMo users
Fake Scholarship Portal
ACTIVEFake Scholarship Secretariat websites collecting Ghana Card details and charging upfront 'processing' fees.
Who's targeted
Graduating students
Ghana Card Loan Fraud
CRITICALIdentity theft using stolen Ghana Card details to take out loans in victims' names at microfinance institutions.
Who's targeted
Rural communities
SIM Swap Reversals
STABLESIM swap attacks bypass PIN security entirely. The attacker takes over the phone number at the telecom level.
Who's targeted
All mobile users
Deepfake Investment Ads
RISINGAI-generated deepfake videos of Ghanaian celebrities promoting fraudulent investment schemes on Facebook and Instagram.
Who's targeted
Social media users
Fake Job Recruitment
ACTIVEWhatsApp job offers requiring 'registration fees' or personal document uploads before a fake interview.
Who's targeted
Job seekers
Community-Reported Threats
Based on 1 reports submitted via KwesiCyber · 1 this week
MoMo Reversal Scam
Top reported locations
Been scammed? Act now.
CSA Ghana
24/7 · Primary
292
Ghana Police CID
Emergency
191
Bank of Ghana
Financial fraud
059 397 4486
Freeze MoMo (MTN)
Dial to freeze
*100#
All reporting channels
Our Report page lists every official Ghanaian authority — CSA, Police, Bank of Ghana, NCA, EOCO, FIC, all telecom providers — with phone numbers, emails, and guidance on which body handles which fraud type.
View All ChannelsLatest Cyber News

Microsoft Warns of WhatsApp-Delivered VBS Malware Hijacking Windows via UAC Bypass

Block the Prompt, Not the Work: The End of "Doctor No"

Casbaneiro Phishing Targets Latin America and Europe Using Dynamic PDF Lures

New Chrome Zero-Day CVE-2026-5281 Under Active Exploitation — Patch Released

3 Reasons Attackers Are Using Your Trusted Tools Against You (And Why You Don’t See It Coming)

Google Attributes Axios npm Supply Chain Attack to North Korean Group UNC1069

Claude Code Source Leaked via npm Packaging Error, Anthropic Confirms

Android Developer Verification Rollout Begins Ahead of September Enforcement
South Africa needs centralised anti-fraud hub, says FSCA - ITWeb
South Africa needs centralised anti-fraud hub, says FSCA ITWeb
‘CanisterWorm’ Springs Wiper Attack Targeting Iran
A financially motivated data theft and extortion group is attempting to inject itself into the Iran war, unleashing a worm that spreads through poorly secured cloud services and wipes data on infected systems that use Iran's time zone or have Farsi set as the default language.
Feds Disrupt IoT Botnets Behind Huge DDoS Attacks
The U.S. Justice Department joined authorities in Canada and Germany in dismantling the online infrastructure behind four highly disruptive botnets that compromised more than three million hacked Internet of Things (IoT) devices, such as routers and web cameras. The feds say the four botnets -- named Aisuru, Kimwolf, J
Iran-Backed Hackers Claim Wiper Attack on Medtech Firm Stryker
A hacktivist group with links to Iran's intelligence agencies is claiming responsibility for a data-wiping attack against Stryker, a global medical technology company based in Michigan. News reports out of Ireland, Stryker's largest hub outside of the United States, said the company sent home more than 5,000 workers th
Microsoft Patch Tuesday, March 2026 Edition
Microsoft Corp. today pushed security updates to fix at least 77 vulnerabilities in its Windows operating systems and other software. There are no pressing "zero-day" flaws this month (compared to February's five zero-day treat), but as usual some patches may deserve more rapid attention from organizations using Window
How AI Assistants are Moving the Security Goalposts
AI-based assistants or "agents" -- autonomous programs that have access to the user's computer, files, online services and can automate virtually any task -- are growing in popularity with developers and IT workers. But as so many eyebrow-raising headlines over the past few weeks have shown, these powerful and assertiv
Who is the Kimwolf Botmaster “Dort”?
In early January 2026, KrebsOnSecurity revealed how a security researcher disclosed a vulnerability that was used to assemble Kimwolf, the world's largest and most disruptive botnet. Since then, the person in control of Kimwolf -- who goes by the handle "Dort" -- has coordinated a barrage of distributed denial-of-servi
INTERPOL-led Law Enforcement Operation Arrests 651 Suspects Linked to Online Scams Across Africa - CPO Magazine
INTERPOL-led Law Enforcement Operation Arrests 651 Suspects Linked to Online Scams Across Africa CPO Magazine
The Psychology Behind Scams: Why smart people get tricked - CitiNewsroom.com
The Psychology Behind Scams: Why smart people get tricked CitiNewsroom.com
‘Starkiller’ Phishing Service Proxies Real Login Pages, MFA
Most phishing websites are little more than static copies of login pages for popular online destinations, and they are often quickly taken down by anti-abuse activists and security firms. But a stealthy new phishing-as-a-service offering lets customers sidestep both of these pitfalls: It uses cleverly disguised links t
