Categories: Hacks

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website www.trivandrumairport.com.

Cyber security officials who were investigating the matter have managed to restore the site briefly after it was hacked by a group called the Kashmir Cheetah.

A message on the website read, ‘Mess with the Best’ read a message from a group called the Pakistan Cyber Attackers. The message on the websites read, “Website stamped by Kashmiri Cheetah.”

Calling themselves’s ‘Kashmiri Cheetahs’, the group was responsible for the hacking of AIIMS Raipur’s website earlier this year.

The key reason why the attackers chose airport websites can be for extracting crucial information about flights, which can lead to compromising consequences.

More than that attackers can mine some sensitive and crucial information from Logistics to infrastructure and other valuable sources.

Our weak cyber security infrastructure has been criticized time and again by noted security experts from the country. India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

Financial sectors are the prime targets of hackers, but they also targeting government websites to mine some sensitive and crucial information.

It is about time, India refocuses on setting up strict anti-hacking teams to counter these attacks or at least track them.

IT firm Nasscom had earlier said that India lacks cyber security personnel to the tune of 50,000, which is a significant number.

While this is not the first time hackers from across the border have attacked government websites, but this particular attack on airport websites should be taken seriously.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

19 hours ago