On February 9, 2026, the ransomware group KillSec announced it had successfully breached Getly, a technology startup based in Nigeria. The threat actor made the claim on its data leak platform, threatening to release sensitive data allegedly exfiltrated from the company's systems if an unspecified ransom is not paid. The startup, which operates getly.app, has not yet issued a public statement, and the claims remain unverified. This attack underscores the indiscriminate nature of modern ransomware operations, which increasingly target organizations of all sizes and geographic locations, including startups in growing tech hubs like Nigeria.
As the claims are unverified and few technical details are available, the analysis is based on the typical modus operandi of such ransomware groups.
T1486 - Data Encrypted for Impact)The targeting of a startup in an emerging market like Nigeria is significant. It shows that ransomware gangs are expanding their reach beyond traditional high-value targets in North America and Europe, recognizing that smaller, less-resourced companies can still be profitable victims.
For a startup like Getly, a successful ransomware attack can be an existential threat:
For organizations facing a ransomware claim:
Even for startups with limited budgets, foundational security controls are critical:
Maintaining and testing offline backups is the most effective way for any organization, especially a startup, to recover from a ransomware attack.
A low-cost, high-impact control that prevents attackers from using stolen credentials to gain initial access.
Mapped D3FEND Techniques:
Training employees to spot and report phishing emails can prevent initial compromise.
For a startup like Getly, implementing Multi-Factor Authentication (MFA) is the single most impactful and cost-effective security measure to prevent the type of breach claimed by KillSec. Many ransomware attacks begin with compromised credentials obtained via phishing or brute-force attacks. MFA provides a critical second layer of defense. Getly should immediately enforce MFA on all user accounts across all critical platforms, including their email service (e.g., Google Workspace, Microsoft 365), cloud infrastructure provider (e.g., AWS, Azure), code repositories (e.g., GitHub), and any remote access solutions (VPNs). Using phishing-resistant MFA methods like FIDO2 security keys is ideal, but even app-based TOTP (e.g., Google Authenticator) provides a massive security improvement over passwords alone. This single control dramatically raises the bar for attackers, making it much harder for them to gain an initial foothold.
The ultimate defense against a ransomware group's primary leverage—data encryption—is the ability to restore from backups. For a tech startup like Getly, this means having a robust backup strategy for both production data and source code. Production databases and file storage should be backed up daily, with at least one copy stored in a logically separate (and preferably offline or immutable) location, such as a different cloud account with different credentials. Source code from repositories like GitHub should also be backed up independently. Most importantly, the restoration process must be tested regularly to ensure the backups are not corrupted and can be used to bring systems back online within an acceptable timeframe. If Getly has viable backups, they can confidently refuse to pay the ransom, restore their systems, and focus on addressing the data leak threat.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats