Govt issues alert as 12,000 Indian sites targeted by Indonesian hackers: Report

14 Apr 2023 11:26:08
New Delhi, April 14 :A cyber attack group from Indonesia has been allegedly targeting 12,000 government websites in India, according to a cybersecurity alert issued by the Centre. "It has been reported that websites of state and central government are potentially being targeted," the alert said while urging concerned government officials to take preventive measures.
 
Indonesian hackers
 
Last year, a massive ransomware attack crippled the systems of All India Institute of Medical Science (AIIMS) rendering its centralised records inaccessible, apart from other hospital services. Overall, the Indian government recorded 19 ransomware attacks against various government organisations in 2022, nearly three times the number recorded the previous year.
 
The I4C alert said that an Indonesian "hacktivist" group was launching denial of service (DoS) and distributed denial of service (DDoS) attacks. DDoS attacks refer to the intentional paralysing of a computer network by flooding it with data sent simultaneously from many individual computers.
 
 
 
The alert also said that the hacktivist group had released a list of government websites that it claims to be targeting, which included state and Central government websites.
 
""Post this alert, government employees need to ensure that they do not fall for social engineering attacks; do not click on unknown emails or links, which can compromise security of such websites. They also ensure that all software updates are up-to-date," Anand Prakash, founder and CEO of cybersecurity firm Pingsafe said.
 
Last year, a Malaysia hacktivist group targeted Indian government websites over a political turmoil that erupted over comments made against Prophet Muhammad.
 
Govt's guidelines to secure websites
 
Recently the government released the third version of Guidelines for India Government Websites (GIGW 3.0), which as the name suggests, provides guidelines to officials on how to safely, and securely, develop, maintain, and manage not just government websites, but also portals and mobile applications.
 
It recommended that developers should encrypt passwords, ensure software and plugins are up-to-date, connection strings, tokens, and keys. Website cookies should also be secure, it added.
 
It also urged developers to not give website backend access to too many high-level employees.
 
"Administrative privileges are given thinking those would be used carefully. Although this is the ideal situation, it is not always the case. Unfortunately, employees do not think about website security when logging into the Servers or the CMS," the guidelines said.
 
"Instead, their thoughts are on the task at hand. If they make a mistake or overlook an issue, this can result in a significant security issue," the GIGW 3.0 said, adding that it was vital to ensure employees have experience in handling back-end of websites before they gain access.
Powered By Sangraha 9.0