Connect with us


Nigerians react as Bet9ja website hackers demand 140bn naira ransom



All you need to know as Bet9ja website hacked by Russian Blackcat group

Nigerians have taken to social media to react to the latest news surrounding the popular sports betting platform after Russian hackers reportedly demanded an incredible 141 billion naira to re-open the website.

Social media reactions have trailed latest reports of Bet9ja's Cyber-security issues
Social media reactions have trailed latest reports of Bet9ja’s Cyber-security issues

The Nigerian punters community was thrown into into a state of mass panic after popular sports betting platform Bet9ja announced that there were technical issues ongoing with the website.


The announcement came after punters took to social media to lament that there were issues accessing the website.

The betting company took to its official Twitter page on Wednesday, April 6 to confirm that there was indeed issues with the site.

The company also went ahead to plead with it’s thousands of customers nationwide, emphasizing that the issue was currently on the path of resolution.

However, latest reports have now confirmed that the popular sports betting platform has been hacked – labelling popular Russian Blackcat Group as being responsible for the latest incident.

Reports also understand that the Russian group are demanding a a fee north of 140 billion naira ($340,000,000) to release the website back to it’s owners.

The Lagos state Lotteries and Gaming Authority also confirmed that they were aware of the situation and have urged customers of the company to be steadfast, assuring that measures were being put in place to retrieve the website.

Bet9ja have also assured customers that their funds are safe and are doing everything as well to regain control of their site.

Following the news about the ridiculous ransom demanded by the hackers, Nigerians have taken to popular social media platform to express their thoughts on Bet9ja’s latest cybersecurity issue.


    %d bloggers like this: