Close Menu
Own News WireOwn News Wire
    What's Hot

    Samsung Galaxy Z Fold 7 tipped to outsize last-gen Z Fold 6: Check details

    TCS leases 630,000 sq.ft. in Chennai amid slow IT office space take-up

    Nissan Layoffs: Carmaker to cut 20,000 jobs globally amid warning of $5 billion record loss – Report

    Facebook X (Twitter) Instagram
    Own News WireOwn News Wire
    • Home
    • About
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer
    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Sports
    • Technology
    • Education
    • Money
    • Companies
    • Entertainment
    Subscribe
    Own News WireOwn News Wire
    You are at:Home » Mint Explainer: The truth behind Pakistan-linked cyberattacks on India
    Technology

    Mint Explainer: The truth behind Pakistan-linked cyberattacks on India

    ONS EditorBy ONS EditorMay 12, 2025No Comments7 Mins Read0 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email


    India’s Operation Sindoor that targeted Pakistani terror camps triggered a wave of disinformation campaigns and claims of cyberattacks on India by Pakistani hackers. But the claims may not hold much water, say security firms.

    Consider this. On Friday, a day before a ceasefire between India and Pakistan was announced, the Indian Press Information Bureau debunked a viral post that claimed ATMs across India would shut down due to a ransomware attack. The bureau simultaneously dismissed another claim that a video titled ‘Dance of the Hillary’ was a virus that would wipe all data on mobile phones.

    Pakistan-linked hackers claim they have launched more than 100 cyberattacks on Indian government, education, and infrastructure websites so far in May. However, a detailed analysis by security firm CloudSEK reveals many of these claims to be “exaggerated or entirely fabricated”.

    Data breaches have been reported in key government platforms, including that of the ministries of defence and external affairs, and the Election Commission of India. Digital public services such as UMANG, Digital Police, and the National Informatics Centre, too, were allegedly compromised, along with the Indian President and Prime Minister’s top administrative websites.

    Judicial systems also allegedly faced disruptions, as did the education sector with cyberattacks on the digital platforms of universities, medical institutions, and testing agencies. The digital infrastructure of the Indian Railways, India Post, RailTel Corporation of India, and major banks like Punjab National Bank and Indian Overseas Bank, were also targeted.

    However, according to CloudSEK, the data breaches often involved outdated or publicly available information, while distributed denial-of-service (DDoS) attacks and defacement attempts “caused negligible disruption—some lasting barely five minutes”. (In a DDoS attack, cybercriminals flood a server with internet traffic to prevent users from accessing connected online services and sites.)

    Mint explains the authenticity of the claims and the real cyber threats India faces.

    Also read | Operation Sindoor: India on high alert for cyber attacks

     

    Did Pakistan-linked cyberattacks on India cause any major damage?

    Pakistan-linked hacker groups such as Nation Of Saviors, KAL EGY 319, and SYLHET GANG-SG have claimed high-profile hits on India, including cyberattacks on the digital platforms of the Election Commission and the Prime Minister’s Office.

    But CloudSEK’s investigations show minimal impact: the Election Commission data breach was a repackaged 2023 leak, and the National Informatics Centre breach was limited to marketing files. Even coordinated DDoS attacks on government platforms resulted in barely noticeable outages.

    Consider these examples.

    On 8 May, Team Azrael–Angel Of Death claimed it breached the Election Commission’s digital platform, allegedly exposing over a million citizen records. However, verification revealed that the data—though containing real personally identifiable information such as names, ages, phone numbers, and addresses—was originally leaked in 2023.

    This reflects a common hacker tactic: repackaging old data to simulate a fresh, high-impact breach, according to CloudSEK. Team Azrael’s claim appears aimed more at generating alarm and publicity than signaling a new compromise of India’s democratic institutions, CloudSEK added.

    On 8-9 May, KAL EGY 319 claimed a widespread defacement campaign targeting about 40 Indian educational and medical websites, followed by a shift to new targets. However, investigation showed all named websites were operational, indicating that the attacks were either not carried out as claimed or had little real impact.

    Similarly, SYLHET GANG-SG and DieNet claimed to have exfiltrated more than 247 GB of data from India’s National Informatics Centre. However, analysis of a 1.5 GB sample shared as “proof” revealed only publicly available marketing content and media files, indicating the claim to be largely unsubstantiated and lacking evidence of compromised sensitive data.

    Also read | Cyberattacks fresh in mind, India raises grid security after Pahalgam

    So are there no major cyberthreats to India?

    While the noise from Pakistan-linked hacker groups has been mostly superficial, advanced persistent threats (APTs)—sophisticated, sustained cyberattacks by hackers that have managed to establish an undetected presence in a network—underscore the real risks, according to security firms.

    APT36, also known as Transparent Tribe or Mythic Leopard, is a Pakistan-linked cyber espionage group active since at least 2013. It primarily targets Indian military, government, and defence-related sectors, often using spear-phishing emails laced with malware disguised as official documents—such as fake Indian Army recruitment forms or covid-19 advisories.

    The group’s main tool is the Crimson RAT (Remote Access Trojan), which enables surveillance through file theft, screen capture, and keystroke logging. APT36, according to CloudSEK, used the Crimson RAT malware to infiltrate Indian defense systems following the Pahalgam terror attack last month. The malware had been delivered via phishing emails disguised as official government documents.

    Once installed, Crimson RAT allowed attackers to capture screenshots, exfiltrate sensitive data, and maintain long-term access, according to CloudSEK.

    Security firm Check Point Research, too, has been tracking the persistent use of ElizaRAT, a custom implant deployed by APT36 in targeted attacks on high-profile entities in India.

    To deploy the Crimson RAT malware, APT36 used spoofed domains resembling Indian government websites and a payload masked as an image file to evade detection, targeting government and defense networks with precision.

    APT36 has also deployed Android malware, including CapraRAT, via fake dating and chat apps to infiltrate mobile devices of military personnel and activists. Considered highly dangerous due to its persistent and stealthy operations, APT36 adapts quickly, refining its tactics and reusing infrastructure to avoid detection.

    CloudSEK’s report also flagged that Pakistan-linked accounts like P@kistanCyberForce and CyberLegendX (@cyber4982) were spreading unverified cyberattack claims, often tied to events like Operation Sindoor. Targets included Bharti Airtel and the Manohar Parrikar Institute, though evidence of real damage is lacking.

    Top 5 Pakistan-linked hacker groups

    Nation of Saviors: 32 claimed attacks

    Claimed disruptions across digital platforms of Indian central and state government departments, financial institutions, and educational bodies. High-profile targets included India’s Central Bureau of Investigation, Election Commission of India, and National Portal of India.

    KAL EGY 319: 31 claimed attacks

    Focused on defacing the websites of Indian colleges, universities, and healthcare institutions. Claimed about 40 websites compromised in a widespread campaign.

    SYLHET GANG-SG: 19 claimed attacks
    Targeted Indian government websites, media outlets, and educational institutions. Notable claims included a data breach of the Andhra Pradesh High Court and theNational Informatics Centre.

    Lực Lượng Đặc Biệt Quân Đội Điện Tử & affiliates: 18 claimed attacks

    Concentrated on Indian courts and government services. Judicial and law enforcement websites, including district and high courts, were key targets.

    Vulture: 16 claimed attacks
    Focused on Indian government and educational sites. Claimed hits on the websites of the Digital Police, President of India, and the Prime Minister’s Office. Often involved in joint hacking operations.

    Does this mean all is hunky-dory?

    As geopolitical tensions rise, India finds itself on the brink of an evolving cyberwar with Pakistan. Recent attacks, including the breach of Pakistan’s Habib Bank by the Indian Cyber Force and retaliatory phishing campaigns by Pakistan-linked APT36, as cited above, signal a new threat to India’s critical digital infrastructure.

    India’s financial systems are on high alert. BSE and NSE recently restricted overseas access to their websites in a rare preemptive move, hinting at credible cyber threats. These measures reflect broader vulnerabilities in India’s digital ecosystem—ranging from legacy systems to inconsistent cyber hygiene across institutions.

    Yet, India lacks a publicly defined doctrine for cyber retaliation, unlike the US and China. India relies heavily on regulatory defenses via the Indian Computer Emergency Response Team (CERT-In), the Reserve Bank of India’s frameworks, and mandates from the Securities and Exchange Board of India, though smaller financial institutions remain exposed.

    With rising hacker activity, espionage, and digital subversion, India’s cyber defense remains reactive and fragmented. Experts argue that a transparent, coordinated national cyber strategy—defensive and offensive—is now a strategic necessity. Is India ready for the next digital war? The answer may depend on how quickly it can bridge the policy-practice gap.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleEvolvence India courts domestic LPs for its largest fund yet, eyes $300 million
    Next Article Vivo V50 Elite Edition launch on May 15: Specs, price and all details
    ONS Editor

    Related Posts

    Samsung Galaxy Z Fold 7 tipped to outsize last-gen Z Fold 6: Check details

    May 12, 2025

    Vivo V50 Elite Edition launch on May 15: Specs, price and all details

    May 12, 2025

    Microsoft may take lower equity in OpenAI to secure long-term access to ChatGPT models: Report

    May 12, 2025

    Comments are closed.

    Editors Picks
    Latest Posts

    Subscribe to Updates

    Get the latest sports news from SportsSite about soccer, football and tennis.

    Your source for the serious news. This demo is crafted specifically to exhibit the use of the theme as a news site. Visit our main page for more demos.

    We're social. Connect with us:

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    © 2025 ThemeSphere. Designed by ThemeSphere.
    • Home
    • About
    • Contact
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.

    Go to mobile version