Sunday, July 21, 2024
EHA

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website www.trivandrumairport.com.

Cyber security officials who were investigating the matter have managed to restore the site briefly after it was hacked by a group called the Kashmir Cheetah.

A message on the website read, ‘Mess with the Best’ read a message from a group called the Pakistan Cyber Attackers. The message on the websites read, “Website stamped by Kashmiri Cheetah.”

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Calling themselves’s ‘Kashmiri Cheetahs’, the group was responsible for the hacking of AIIMS Raipur’s website earlier this year.

The key reason why the attackers chose airport websites can be for extracting crucial information about flights, which can lead to compromising consequences.

More than that attackers can mine some sensitive and crucial information from Logistics to infrastructure and other valuable sources.

Our weak cyber security infrastructure has been criticized time and again by noted security experts from the country. India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

Financial sectors are the prime targets of hackers, but they also targeting government websites to mine some sensitive and crucial information.

It is about time, India refocuses on setting up strict anti-hacking teams to counter these attacks or at least track them.

IT firm Nasscom had earlier said that India lacks cyber security personnel to the tune of 50,000, which is a significant number.

While this is not the first time hackers from across the border have attacked government websites, but this particular attack on airport websites should be taken seriously.

Website

Latest articles

Hackers Claiming Dettol Data Breach: 453,646 users Impacted

A significant data breach has been reported by a threat actor known as 'Hana,'...

CrowdStrike Update Triggers Widespread Windows BSOD Crashes

A recent update from cybersecurity firm CrowdStrike has caused significant disruptions for Windows users,...

Operation Spincaster Disrupts Approval Phishing Technique that Drains Victim’s Wallets

Chainalysis has launched Operation Spincaster, an initiative to disrupt approval phishing scams that have...

Octo Tempest Know for Attacking VMWare ESXi Servers Added RansomHub & Qilin to Its Arsenal

Threat actors often attack VMware ESXi servers since they accommodate many virtual machines, which...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

macOS Users Beware Of Weaponized Meeting App From North Korean Hackers

Meeting apps are often targeted and turned into weapons by hackers as they are...

Hackers Exploiting Legitimate RMM Tools With BugSleep Malware

Since October 2023, MuddyWater, which is an Iranian threat group linked to MOIS, has...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Free Webinar

Low Rate DDoS Attack

9 of 10 sites on the AppTrana network have faced a DDoS attack in the last 30 days.
Some DDoS attacks could readily be blocked by rate-limiting, IP reputation checks and other basic mitigation methods.
More than 50% of the DDoS attacks are employing botnets to send slow DDoS attacks where millions of IPs are being employed to send one or two requests per minute..
Key takeaways include:

  • The mechanics of a low-DDoS attack
  • Fundamentals of behavioural AI and rate-limiting
  • Surgical mitigation actions to minimize false positives
  • Role of managed services in DDoS monitoring

Related Articles