Categories: Hacks

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website

Pakistani Cyber Attackers Hacked Thiruvananthapuram airport Website www.trivandrumairport.com.

Cyber security officials who were investigating the matter have managed to restore the site briefly after it was hacked by a group called the Kashmir Cheetah.

A message on the website read, ‘Mess with the Best’ read a message from a group called the Pakistan Cyber Attackers. The message on the websites read, “Website stamped by Kashmiri Cheetah.”

Calling themselves’s ‘Kashmiri Cheetahs’, the group was responsible for the hacking of AIIMS Raipur’s website earlier this year.

The key reason why the attackers chose airport websites can be for extracting crucial information about flights, which can lead to compromising consequences.

More than that attackers can mine some sensitive and crucial information from Logistics to infrastructure and other valuable sources.

Our weak cyber security infrastructure has been criticized time and again by noted security experts from the country. India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

India ranks among the top 10 countries, with a large number of cyber crimes, ranging from online harassment to fraud, and even spying.

Financial sectors are the prime targets of hackers, but they also targeting government websites to mine some sensitive and crucial information.

It is about time, India refocuses on setting up strict anti-hacking teams to counter these attacks or at least track them.

IT firm Nasscom had earlier said that India lacks cyber security personnel to the tune of 50,000, which is a significant number.

While this is not the first time hackers from across the border have attacked government websites, but this particular attack on airport websites should be taken seriously.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

View Comments

Recent Posts

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search…

2 days ago

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the…

2 days ago

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing…

2 days ago

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware,…

2 days ago

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of…

2 days ago

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious…

2 days ago