15 April 2024 | 11:43 PM

Gone phishing: Business owner almost scammed by fake Covid-19 government tender

Key Takeaways

Bogus government tenders appear to be targeted at businesses listed on the national treasury’s Central Supplier Database (CSD) because of a suspected leak within the publicly inaccessible database.

This database is, as it claims, a “single source of key supplier information” for organs of state. Businesses register on the CSD and can then be considered for government contracts.

One business owner, who spoke to amaBhungane on condition of anonymity, explained that she only began to receive these bogus tenders when she applied to list her company on the database. She also fell for one such tender.

Click on the Evidence docket for access to the website information we used in this story.

On 8 April 2020, the department of health sent out an email to businesses about a new tender for industrial sanitiser machines – specifically, for the DX610M model.

Prospective suppliers had six days to respond to the bid, which closed on 14 April.

Typically, when responding to a tender, there should be sufficient generic information accompanying the description of the tender, so that individual businesses can meet almost all the requirements with their own products – in this case, a sanitiser machine.

The business owner did a cursory investigation and concluded that the request for quotation (RFQ) seemed legitimate. She then responded to the request.

One day after submitting her bid, the business owner received a call from a supply chain official, Tshepo Mokoena. He congratulated her on her successful bid application.

Mokoena then asked her for the batch number on the product to check whether it would meet the requirements of the South African Bureau of Standards. “This seemed weird,” the business owner said – because a batch number is only given after a product is manufactured.

He then asked her if she was sourcing the sanitiser machines locally, explaining that she had a 90% chance of losing out on the bid if she did not do so. He promised to provide her with a list of local producers.

In the end, he sent her the name and contact numbers of one company: Sanetex Hygiene.

Sanetex Hygiene also appeared to be the only company, after a cursory Google search, that could source the specific DX610M sanitiser machine for R7 500 per unit.

To secure her bid, the business owner planned to order the machines from Sanetex Hygiene to supply the department of health. However, she was alarmed when she received a response from the Russian equivalent of a Gmail address – an unusual email account for a South African business.

Phishing: Impersonating officials and what to do about it

Government departments have warned businesses against being fooled by email scams for some time. But the economic hardship from the coronavirus lockdown has increased the number of fraudulent emails circulating online.

Even the World Health Organisation has warned the public about fake emails sent in its name. The problem with the fake emails is that cybersecurity is not a priority. According to a 2018 report from cybersecurity leader Varonis, “58% of companies have over 100 000 folders open to everyone, and 41% have over 1 000 sensitive files open to everyone”.

This means that if one person in the corporate ecosystem lacks the necessary security and opens a dodgy email or PDF document, they could affect the company’s overall security.

Over the last five years, the principal at Pienaar Consulting, Maria Pienaar, has found that companies have dramatically cut their IT and security budgets, which is a problem as it opens the company to increased cyber and phishing attacks because of more gaps in their security solutions.

She explained that there needed to be more public awareness and education “like what the banks and cellphone networks have done with the scam alerts”, “Cybersecurity must be a priority from the board level down, with closer collaboration with the business side, finance department and IT,” she explained.

Investigating cybercrime has increasingly become a priority for the police and the Specialised Commercial Crimes Unit of the Hawks, which handles cybercrime and has trained over 3 000 members between 2017 and 2019.

In the 2018/19 financial year, the Hawks successfully investigated 104 cyber-related cases out of a total of 130 complaints – almost all of them leading to convictions.

In its annual report, the National Prosecuting Authority noted the successful conviction of an IT specialist, who pleaded guilty to two counts of fraud and was sentenced to 10 years’ imprisonment, three years of which were suspended.

“The accused introduced, or caused to be introduced, or loaded into the company computer system a computer software which had the capacity to allow an unauthorised person to remotely access the company’s user access codes, online bank account portal and users’ online banking passwords,” wrote the NPA.

Then, in October 2016, someone accessed the company’s accounts and stole R703 079. Although there has been an increase in training received by SAPS officials, Jacqueline Fick, a forensic investigator specialising in electronic fraud, believes that more needs to be done.

According to Fick, the police do not have an accurate figure of the number of cybercrime cases because “victims do not report all these instances to the police”. “Or,” she said, “where the victim does report the crime, the docket is not opened.

For example, a complainant is sent away, with police saying it is a commercial matter.” _Gemma Ritchie [/sidebarContentStory]

When Mokoena called the business owner the next day, she asked him about the Yandex email address. He hung up on her.

Had the business owner followed through with the tender, she would have paid for non-existent machines for a non-existent tender from a fake department of health official.

Several business owners say they have received RFQs for products ranging from geysers and wheelchairs to the electric cables required for trains used by the Passenger Rail Agency of South Africa. Such requests might have been appropriate if the businesses specialised in these products.

Advocate Jacqueline Fick, a forensic investigator specialising in electronic fraud, told amaBhungane that because of the large ecosystem of departments connected to the database to verify suppliers’ credentials, there were vulnerabilities in the system.

This ecosystem includes the department of home affairs, the South African Revenue Service, company registrations that appear on the database of the Companies and Intellectual Property Commission, and government employees on the public service payroll system known as Persal.

Maria Pienaar, principal at Pienaar Consulting and formerly the chief information officer at Cell C, said: “When departments in organisations are disjointed, it creates opportunities for fraud. In the case of government departments, each government department is responsible for their own budgets and how they apply these standards in the systems they implement.

“This leaves gaps for cyber fraud if there are not appropriate governance measures and audits in place to ensure compliance or if budgets are not appropriately applied to alleviate these risks.”

When asked for comment, national treasury said: “The system was checked and proofed against phishing and hacking before the volatile situation of Covid-19. This is done frequently to ensure that possible breaches are prevented.”

According to the treasury, there are more than 500 000 listed suppliers on the website and more than 700 000 registered users. More than 800 government departments and state-owned enterprises use the database to identify suppliers and check for compliance.

With the marked decrease in face-to-face human interaction as a result of the outbreak of the coronavirus pandemic, the opportunity for fraudsters to take advantage of business owners will rise exponentially.

So, what had the business owner missed?

This bid had several dodgy elements to it: the urgency of the bid; the short timeframe that businesses had to respond to it; the monopoly of suppliers for the item; and the unusual government email address: healthsupplychain-za.org.

When amaBhungane called the number listed on the email for comment and explained our intentions, the operator dropped the call.

According to the CSD website, fraudsters “send a fictitious RFQ from what would seem to be a governmental email address and use a fake RFQ form with a logo and contact details of the contact person. These requests are usually ‘urgent’ and the whole process is concluded within a short period of time.”

In 2016, the department of health complained of a high number of scammers using the following emails:


The official national department of health’s emails end with “@health.gov.za”.

To top it all, Sanetex Hygiene was not registered with the companies’ registrar and its website was created a day before lockdown was implemented. When amaBhungane phoned the business to ask about its company registration, the operator dropped the call.

Sanetex Hygiene’s website has since been taken down after the businesswoman reported it to its domain registry, but you can see a cached version of it here, and a screenshot of the website here.

In August last year, the treasury advertised a tender for the maintenance of the database and awarded the contract to local IT firm Gijima for three years, starting from 1 April 2020. The contract is valued at over R42 million.

According to the tender document, Gijima will not only be expected manage the database and prevent the duplication of suppliers, but in terms of cybersecurity, it will also be required to implement standardised electronic verification of supplier information to reduce fraud.

In the meantime, the treasury has said that the key to avoid being scammed is for businesses to “reduce the number of sectors and commodities they register for, so that they recall these when the scam RFQ reaches them, that they are not registered for this particular item or commodity.

Like this story? Be an amaB Supporter to help us do more. Sign up for our newsletter to get more.

“[Businesses need to] make sure they do not deviate from the services or commodities they registered for on the CSD, as most [business owners] who fall for scams do.

“[They need to] be familiar with the institutions they do business with, and their mandates, amongst others. [They need to] protect their company information when sharing in what they refer to [as] ‘networking sessions’.”

Also read

Wild West Web: the return of the scam

Share this story:



Before joining the amaBhungane team in 2017, Micah was the national coordinator for media freedom and diversity at the Right2Know Campaign. He holds a Masters in African Studies from Oxford University and a BA Honours in History from Wits University.

Your identity is safe with us. Email or Call us


Related Stories