Indian Police In A Cyberwar

While those behind the recent cases of Indian websites being defaced are claiming to be waging a ‘cyber war’ to avenge the surgical strikes against Pakistan recently, the police and cyber experts agree that these are attempts to salvage a bruised ego and are doing very little actual damage.

On October 3, the website of the National Green Tribunal in Delhi was hacked and pro-Pakistan messages were left on the home page. The next day, the website of a Kerala-based institute was defaced in a similar fashion, while on Monday evening, the website of the Government Law College (GLC) in Churchgate was targeted.

The GLC had recently informed the police about the incident, and the Cyber police in Mumbai have initiated parallel inquiries into the matter, a Cyber police officer confirmed. The officer, however, said the attacks were aimed more at creating propaganda than at causing any actual loss.

“In all the three cases, the perpetrators only put up a poster on the home page of the target websites. A cyber-attack is considered a ‘hack’ when someone takes over control of a particular website or web page, which was not the case in any of the three incidents. Further, the perpetrators could not access any data or cause any damage to the operations of the institutions,” said the officer.

The fact that Pakistani hackers were targeting websites with extremely low safeguards against hacking was an indicator of their prowess and the fact that these incidents were little more than attempts to save face in any way possible. “An attack on the ground cannot be avenged by a few easy attacks in the cyber space,” another officer said.

Cyber expert Vijay Mukhi said, “Government websites are like low-hanging fruits, easy to target due to their lack of security. For some reason, the Centre does not believe in upgrading its cyber security infrastructure. Such attacks on government websites keep happening but do not make a dent. Pakistani hackers have till date not been able to hack and take control of any privately-owned website.”

Cyber police officers said a study of cyber-attacks over the past few years has showed a similar trend, where loosely-guarded government websites have been defaced with pro-Pakistan messages.

“The aim is to try and create a feeling among the laymen that Pakistani hackers are capable of cyber warfare, whereas in reality, such hackers have not accomplished anything beyond spreading propaganda during the short period till the defacement is discovered and the particular web page shut down,” an officer said.

The Hindu
 

« Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'
The Science of Threat Intelligence »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

ManTech International

ManTech International

ManTech provides comprehensive, integrated cyber security support, which includes computer and network design, implementation, and operations.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

NodeSource

NodeSource

NodeSource helps organizations run production-ready Node.js applications with greater visibility into resource usage and enhanced awareness around application performance and security.

Lifetech

Lifetech

Lifetech is a software development, product engineering and system integration company. Cybersecurity services include SIEM deployment and training.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

NewAE Technology

NewAE Technology

NewAE Technology is revolutionizing the hardware security market by making every engineer and designer aware of side-channel power analysis and glitching as important attack vectors.

AArete

AArete

AArete is a global management and technology consulting firm specializing in strategic profitability improvement, digital transformation, and advisory services.

APCERT

APCERT

APCERT cooperates with CERTs and CSIRTs to ensure internet security in the Asia Pacific region, based around genuine information sharing, trust and cooperation.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.

Lumos

Lumos

Lumos, the Unified Access Platform to manage all access to apps and data.

Aikido Security

Aikido Security

Aikido is the no-nonsense security platform for developers. Secure your code, cloud, and runtime in one central system. Find and fix vulnerabilities automatically.

Dark Entry

Dark Entry

Dark Entry provide solutions to safeguard businesses, leveraging advanced technologies and intelligence-driven approaches to detect and mitigate risks associated with compromised data.