NEW DELHI : Dragon Force, a Malaysian hacktivist group, has referred to as upon hackers around the globe to focus on the Indian authorities’s data expertise (IT) infrastructure with cyber assaults. On June 10, the group expressed its intent through a publish on its Twitter, terming this transfer as a “particular operation”.
The hacktivist group’s transfer seemingly comes after members of India’s Bharatiya Janata Party (BJP), Nupur Sharma and Naveen Kumar Jindal, made feedback towards Islam, and the faith’s chief Prophet Muhammad. While Sharma has since been suspended, Jindal has been expelled.
A hacktivist group reminiscent of Dragon Force seeks to make use of cyber assaults as a technique to elevate consciousness and protest towards a celebration, buoyed by a motive. Anonymous is by and huge some of the widespread examples of hacktivism.
Since its announcement, Dragon Force has posted a number of situations of what they declare are breaches of assorted web sites and departments in India. The firm claims to have taken down the companies of a preferred website hosting firm in India, referred to as Hostnet India, which in flip have led to a number of corporations’ web sites being introduced down.
Some of those web sites embody Nagpur’s Institute of Science, in addition to different academic institutes and organizations – largely from the Maharashtra area. While these websites have been hacked and changed with a message from the group, the latter has since been taken down – though the web sites stay unavailable on the time of publishing.
Dragon Force additionally revealed an inventory on Twitter, which it claimed was a database containing data belonging to members of the Indian authorities. However, the e-mail addresses listed on the purported database appeared to include private addresses – and no official ones.
Nagpur City Police cyber inspector, Nitin Phatangare, stated in a report with the Press Trust of India that extra such incidents have been reported – together with ones in Mumbai over the weekend.
Darshit Ashara, principal menace researcher at Singapore-based cyber safety agency CloudSEK, stated that the Indian authorities mustn’t take the Dragon Force menace evenly, and urged official departments to “nullify the low-hanging fruit that menace actors sometimes use as preliminary vectors to provoke assaults.”
These vectors, as Ashara stated, embody “malware logs, misconfigured functions, default passwords, unpatched or outdated servers and different property, and beforehand leaked databases being offered on the darkish internet.”
Subscribe to Mint Newsletters
* Enter a sound e-mail
* Thank you for subscribing to our publication.