4.8 million users
Kenya's digital health ecosystem has been dealt a devastating blow by an alleged massive data breach at M-TIBA, a mobile health wallet operated by CarePay in partnership with Safaricom. A threat actor using the alias Kazu has claimed on dark web forums to have exfiltrated 2.15 terabytes of data, containing over 17 million files related to 4.8 million users. The breach exposes an enormous volume of highly sensitive Protected Health Information (PHI) and Personally Identifiable Information (PII). The incident is particularly alarming as it occurred just two months after CarePay announced it had achieved ISO/IEC 27001:2022 certification, raising serious questions about the effectiveness of its security controls. If confirmed, this stands as one of the most severe data breaches in Kenyan history.
The threat actor 'Kazu' announced the breach on dark web forums and a Telegram channel, releasing a 2GB sample file as proof of the hack. This sample alone reportedly contains the records of 114,000 individuals, including primary M-TIBA account holders and their dependents. The attacker's motives appear to be financial, as they are likely attempting to sell the massive database on underground markets. CarePay, the operator of M-TIBA, has stated it is 'actively investigating' the claims, while Kenya's Office of the Data Protection Commissioner (ODPC) has acknowledged awareness of the incident.
The breach appears to be a direct compromise of the backend infrastructure hosting the M-TIBA platform's data. The sheer volume of data (2.15 TB) suggests the attacker gained deep, persistent access to primary databases or file storage repositories. The leaked data allegedly includes:
The attack vector has not been confirmed, but possibilities include:
T1190 - Exploit Public-Facing Application: A vulnerability in the M-TIBA web platform or its APIs.T1530 - Data from Cloud Storage Object: Misconfigured or compromised cloud storage buckets (e.g., AWS S3, Azure Blob Storage).T1078 - Valid Accounts: Use of stolen developer or administrator credentials.The impact of this breach is catastrophic for the 4.8 million affected individuals and the broader Kenyan society.
No specific Indicators of Compromise (IOCs) were provided in the source articles.
For M-TIBA, the focus is now on incident response: determining the initial access vector, ejecting the threat actor, and assessing the full scope of the breach. For affected individuals, the response is focused on mitigating personal risk.
This breach serves as a stark reminder of the responsibilities that come with handling sensitive data.
D3-FE: File Encryption and D3-DENCR: Disk Encryption are fundamental for protecting data at rest.D3-RAPA: Resource Access Pattern Analysis can help detect anomalous data access by an attacker, potentially identifying a breach in progress.Encrypting sensitive PII and PHI at rest is a fundamental control that could have limited the utility of the stolen data.
Mapped D3FEND Techniques:
Strictly control network access to backend databases and storage, limiting it to specific application servers.
Mapped D3FEND Techniques:
Enforce least privilege and closely monitor all administrative and service accounts with access to sensitive data repositories.
Mapped D3FEND Techniques:
For a platform like M-TIBA handling millions of sensitive health records, encryption at rest is non-negotiable. This breach highlights that platform-level or disk-level encryption is insufficient. Organizations must implement application-level or field-level encryption for all PII and PHI stored in databases and file systems. This means sensitive fields like 'national_id', 'phone_number', and 'diagnosis' should be individually encrypted within the database itself. The encryption keys must be managed in a separate, secure key management service (KMS) or hardware security module (HSM). This ensures that even if an attacker compromises the database server and exfiltrates the raw data files, as 'Kazu' likely did, the most sensitive information remains encrypted and useless without access to the keys. This countermeasure moves the defensive line from the infrastructure perimeter to the data itself.
To detect a breach like this in progress, M-TIBA should have been using Resource Access Pattern Analysis. A threat actor exfiltrating 2.15 TB of data would generate highly anomalous access patterns. Security teams should deploy tools (like a CASB for cloud environments or a DAM for on-prem databases) to baseline normal data access. Alerts should be configured for when a single user account or service principal accesses an abnormally high number of records, accesses data outside of normal business hours, or downloads data in bulk. An attacker like 'Kazu' querying millions of records and downloading terabytes of files would deviate massively from the behavior of a legitimate application process. Detecting this early could have allowed the security team to intervene, terminate the session, and prevent the full-scale exfiltration.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats