Friday, May 2, 2025
HomeSecurity NewsUHBVN Billing Data Hacked and Hackers Demanding one Crore in Bitcoins

UHBVN Billing Data Hacked and Hackers Demanding one Crore in Bitcoins

Published on

SIEM as a Service

Follow Us on Google News

UHBVN was hacked, hackers stole the billing data and demands for one crore ransom in Bitcoins. The cyber attack happened targetting UHBVN IT wing at 12.17 AM on March 21.

Thousand of Uttar Haryana Bijli Vitran Nigam consumers billing data has been hacked, on March 22 when employees arrived all their computers flashing ransom notes demanding ” One crore in form of bitcoins from the state government in order to retrieve the data” according to The New Indian Express.

A case has been registered and the Haryana cyber police wing investigating the cyber incident. According to the sources, the officials of the Nigam are busy uploading the billing data from the log books and some of the data has been uploaded.

UHVBN claimed that the cyber attack on the Automatic Meter Reading System (AMR) has not at all affected the billing of about 4,000 Industrial consumers as the backup of the billing data is accessible with the Uttar Haryana Bijli Vitran Nigam.
- Advertisement - Google News

Nigam official said there is no loss of billing data and the billing consumers would not be affected.He also added immediately after the attack the complete system study was carried out by the concerned officers, cyber expert as well as other IT experts.

Also Read Most Important Consideration for Industrial Control System(ICS) Cyber Defense

Officials said the database has been encrypted and the backup of the encrypted database was also taken for further retrieval.

Nigam also indicated that they are already in the progress of moving the data to the cloud and it would come to operational by the end of May 2018.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Managing Shadow IT Risks – CISO’s Practical Toolkit

Managing Shadow IT risks has become a critical challenge for Chief Information Security Officers...

Application Security in 2025 – CISO’s Priority Guide

Application security in 2025 has become a defining concern for every Chief Information Security...

Preparing for Quantum Cybersecurity Risks – CISO Insights

Quantum cybersecurity risks represent a paradigm shift in cybersecurity, demanding immediate attention from Chief...

Securing Digital Transformation – CISO’s Resource Hub

In today’s hyper-connected world, securing digital transformation is a technological upgrade and a fundamental...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

FBI Alerts Public to Scammers Posing as IC3 Officials in Fraud Scheme

The Federal Bureau of Investigation (FBI) has issued a warning regarding an emerging scam...

New ‘Waiting Thread Hijacking’ Malware Technique Evades Modern Security Measures

Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking"...

EU’s GDPR Article 7 Poses New Challenges for Businesses To Secure AI-Generated Image Data

As businesses worldwide embrace digital transformation, the European Union’s General Data Protection Regulation (GDPR),...