Indian Police In A Cyberwar

While those behind the recent cases of Indian websites being defaced are claiming to be waging a ‘cyber war’ to avenge the surgical strikes against Pakistan recently, the police and cyber experts agree that these are attempts to salvage a bruised ego and are doing very little actual damage.

On October 3, the website of the National Green Tribunal in Delhi was hacked and pro-Pakistan messages were left on the home page. The next day, the website of a Kerala-based institute was defaced in a similar fashion, while on Monday evening, the website of the Government Law College (GLC) in Churchgate was targeted.

The GLC had recently informed the police about the incident, and the Cyber police in Mumbai have initiated parallel inquiries into the matter, a Cyber police officer confirmed. The officer, however, said the attacks were aimed more at creating propaganda than at causing any actual loss.

“In all the three cases, the perpetrators only put up a poster on the home page of the target websites. A cyber-attack is considered a ‘hack’ when someone takes over control of a particular website or web page, which was not the case in any of the three incidents. Further, the perpetrators could not access any data or cause any damage to the operations of the institutions,” said the officer.

The fact that Pakistani hackers were targeting websites with extremely low safeguards against hacking was an indicator of their prowess and the fact that these incidents were little more than attempts to save face in any way possible. “An attack on the ground cannot be avenged by a few easy attacks in the cyber space,” another officer said.

Cyber expert Vijay Mukhi said, “Government websites are like low-hanging fruits, easy to target due to their lack of security. For some reason, the Centre does not believe in upgrading its cyber security infrastructure. Such attacks on government websites keep happening but do not make a dent. Pakistani hackers have till date not been able to hack and take control of any privately-owned website.”

Cyber police officers said a study of cyber-attacks over the past few years has showed a similar trend, where loosely-guarded government websites have been defaced with pro-Pakistan messages.

“The aim is to try and create a feeling among the laymen that Pakistani hackers are capable of cyber warfare, whereas in reality, such hackers have not accomplished anything beyond spreading propaganda during the short period till the defacement is discovered and the particular web page shut down,” an officer said.

The Hindu
 

« Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'
The Science of Threat Intelligence »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cloud Industry Forum (CIF)

Cloud Industry Forum (CIF)

Cloud Industry Forum is a non-profit industry body that champions and advocates the adoption and use of Cloud-based services by businesses and individuals.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Casaba Security

Casaba Security

Casaba are specialists in software security providing managed Software Development Lifecycle services as well as products for security testing.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Signifyd

Signifyd

Signifyd is the world's largest provider of Guaranteed e-Commerce Fraud Protection.

Kobil Systems

Kobil Systems

Kobil is a pioneer in the fields of smart card, one-time password, authentication and cryptography.

Datec PNG

Datec PNG

Datec is the the largest end-to-end information and communications technology solutions and services provider in Papua New Guinea.

Center for Applied Cybersecurity Research (CACR) - University of Indiana

Center for Applied Cybersecurity Research (CACR) - University of Indiana

CACR serves Indiana and the nation by tackling cyber risk in research and other unusual environments through agile, holistic, principle-based cybersecurity.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Greenberg Traurig (GT)

Greenberg Traurig (GT)

Greenberg Traurig, LLP (GT) is a global law firm with offices in 40 locations in the United States, Latin America, Europe, Asia, and the Middle East.

Data Storage Corp (DSC)

Data Storage Corp (DSC)

Data Storage Corporation is a provider of data recovery and business continuity services that help organizations protect their data, minimize downtime and recover and restore data.

LiveAction

LiveAction

LiveAction provides end-to-end visibility of network and application performance from a single pane of glass.

SOC Prime

SOC Prime

SOC Prime is the only Threat Detection Marketplace where researchers monetize their content to help security teams defend against attacks easier, faster and more efficiently than ever.

DH2i Company

DH2i Company

DH2i is a leading provider of multi-platform Software Defined Perimeter and Smart Availability software enabling customers to create an entire IT infrastructure that is always-secure and always-on.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.