KillSec Ransomware Group Claims Attack on Nigerian Tech Startup Getly

Nigerian Startup Getly Targeted by KillSec Ransomware Group

MEDIUM
February 9, 2026
4m read
RansomwareThreat ActorCyberattack

Impact Scope

Affected Companies

Getly

Industries Affected

Technology

Geographic Impact

Nigeria (national)

Related Entities

Threat Actors

KillSec

Other

Getly

Full Report

Executive Summary

On February 9, 2026, the ransomware group KillSec announced it had successfully breached Getly, a technology startup based in Nigeria. The threat actor made the claim on its data leak platform, threatening to release sensitive data allegedly exfiltrated from the company's systems if an unspecified ransom is not paid. The startup, which operates getly.app, has not yet issued a public statement, and the claims remain unverified. This attack underscores the indiscriminate nature of modern ransomware operations, which increasingly target organizations of all sizes and geographic locations, including startups in growing tech hubs like Nigeria.

Threat Overview

  • Threat Actor: KillSec (a ransomware group)
  • Target: Getly, a Nigerian technology startup.
  • Timeline: The attack was claimed by KillSec on February 9, 2026.
  • Claim: The group claims to have breached Getly and stolen sensitive data, which it threatens to leak.
  • Status: The claims are currently unverified, and Getly has not made a public comment.

Technical Analysis

As the claims are unverified and few technical details are available, the analysis is based on the typical modus operandi of such ransomware groups.

  1. Initial Access: Ransomware groups targeting smaller companies or startups often use less sophisticated but effective entry vectors. These can include exploiting vulnerabilities in public-facing web applications, password spraying against exposed services like RDP or VPN, or phishing campaigns targeting employees.
  2. Execution: Once inside, the attackers would likely deploy commodity malware or scripts to perform reconnaissance and escalate privileges.
  3. Exfiltration & Impact: Following the standard double-extortion model, the group would have located and exfiltrated valuable data before deploying their ransomware encryptor. The final encryption stage would lock the company's files, disrupting operations and adding pressure to pay the ransom. (T1486 - Data Encrypted for Impact)

The targeting of a startup in an emerging market like Nigeria is significant. It shows that ransomware gangs are expanding their reach beyond traditional high-value targets in North America and Europe, recognizing that smaller, less-resourced companies can still be profitable victims.

Impact Assessment

For a startup like Getly, a successful ransomware attack can be an existential threat:

  • Financial Loss: The cost of the ransom demand, combined with business downtime and recovery expenses, can be crippling for a young company with limited cash flow.
  • Data Breach Consequences: The leak of sensitive customer or proprietary company data can lead to loss of customer trust, competitive disadvantage, and potential regulatory scrutiny.
  • Reputational Damage: A public data breach can severely damage a startup's brand and its ability to attract future customers, investors, and talent.
  • Operational Halt: With critical systems encrypted, the company may be unable to operate, develop its product, or serve its customers, effectively grinding the business to a halt.

Detection & Response

For organizations facing a ransomware claim:

  • Verification: The first step is to urgently investigate the claim's validity. This involves a rapid search for technical evidence of a compromise, such as ransom notes, encrypted files, or logs showing unauthorized access or data exfiltration.
  • Containment: If evidence of a breach is found, immediately isolate affected systems from the network to prevent further spread.
  • Expert Engagement: Engage a DFIR firm to conduct a professional investigation and guide the response and recovery process.
  • Communication: Prepare a communication strategy for employees, customers, and stakeholders, but do not make public statements until the situation is well understood.

Mitigation

Even for startups with limited budgets, foundational security controls are critical:

  1. Multi-Factor Authentication (MFA): Implement MFA on all critical accounts and services, especially email, administrative accounts, and remote access solutions. This is one of the most effective and low-cost defenses.
  2. Backups: Maintain regular, tested, and offline backups of all critical data. This is the most important control for recovering from a ransomware attack without paying.
  3. Patch Management: Keep all software and systems patched, prioritizing vulnerabilities in internet-facing services.
  4. Security Awareness Training: Train employees to recognize and report phishing attempts, which are a common entry vector.
  5. Dark Web Monitoring: Use services to monitor the dark web for mentions of the company or leaked credentials, which can provide an early warning of an impending attack.
  6. Endpoint Security: Deploy a reputable next-generation antivirus (NGAV) or EDR solution on all endpoints.

Timeline of Events

1
February 9, 2026
KillSec claims responsibility for an attack on the Nigerian startup Getly.
2
February 9, 2026
This article was published

MITRE ATT&CK Mitigations

Maintaining and testing offline backups is the most effective way for any organization, especially a startup, to recover from a ransomware attack.

A low-cost, high-impact control that prevents attackers from using stolen credentials to gain initial access.

Mapped D3FEND Techniques:

Training employees to spot and report phishing emails can prevent initial compromise.

D3FEND Defensive Countermeasures

For a startup like Getly, implementing Multi-Factor Authentication (MFA) is the single most impactful and cost-effective security measure to prevent the type of breach claimed by KillSec. Many ransomware attacks begin with compromised credentials obtained via phishing or brute-force attacks. MFA provides a critical second layer of defense. Getly should immediately enforce MFA on all user accounts across all critical platforms, including their email service (e.g., Google Workspace, Microsoft 365), cloud infrastructure provider (e.g., AWS, Azure), code repositories (e.g., GitHub), and any remote access solutions (VPNs). Using phishing-resistant MFA methods like FIDO2 security keys is ideal, but even app-based TOTP (e.g., Google Authenticator) provides a massive security improvement over passwords alone. This single control dramatically raises the bar for attackers, making it much harder for them to gain an initial foothold.

The ultimate defense against a ransomware group's primary leverage—data encryption—is the ability to restore from backups. For a tech startup like Getly, this means having a robust backup strategy for both production data and source code. Production databases and file storage should be backed up daily, with at least one copy stored in a logically separate (and preferably offline or immutable) location, such as a different cloud account with different credentials. Source code from repositories like GitHub should also be backed up independently. Most importantly, the restoration process must be tested regularly to ensure the backups are not corrupted and can be used to bring systems back online within an acceptable timeframe. If Getly has viable backups, they can confidently refuse to pay the ransom, restore their systems, and focus on addressing the data leak threat.

Sources & References

KillSec Ransomware Attack Targets Nigerian Startup Getly
DEXPOSE (dexpose.io) February 9, 2026
KillSec Ransomware Strikes Nigerian Startup Getly
Nigeria Cybersecurity (nigeriacybersecurity.com) February 9, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

KillSecRansomwareNigeriaStartupCybercrime

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading