LM NEWS 24
LM NEWS 24

Pakistan’s Desperate Cyber Provocations, Attempts Foiled By India

In a continued wave of cyber offensives, Pakistan-sponsored hacker groups such as “Cyber Group HOAX1337” and “National Cyber Crew” made unsuccessful attempts to breach some websites yesterday. These hacking efforts were promptly identified and neutralised by cybersecurity agencies.

Among the latest provocations, the websites of Army Public School Nagrota and Sunjuwan were targeted and attempted to be defaced with messages mocking the victims of the recent Pahalgam terror attack. In another incident, a website catering to ex-servicemen’s healthcare services was defaced, signalling Pakistan’s growing frustration.

There have been repeated attempts made by hackers operating from Pakistan to attack websites having linkages to children, old age veterans and other innocent people. Resorting to attacking veterans’ and families’ platforms reflects another low by Pakistan and their continuous attempts to operate in unethical ways.

The hacking of the Army Institute of Hotel Management’s website and Indian Air Force veterans further illustrates the Pakistani establishment’s intent to provoke and escalate tensions in the digital battlespace.

Earlier on April 29, Pakistan redirected its efforts towards publicly accessible welfare and educational websites after finding mission-critical national networks impenetrable. Operating under the moniker “IOK Hacker” – Internet of Khilafah, the group sought to deface pages, disrupt online services and harvest personal information. India’s layered cybersecurity architecture detected the intrusions in real-time and quickly traced their origin to Pakistan.

Intelligence assessments confirmed four related incidents. The websites of Army Public School (APS) Srinagar and APS Ranikhet were both targeted with inflammatory propaganda. APS Srinagar also faced a distributed-denial-of-service assault.

An attempted breach of the Army Welfare Housing Organisation (AWHO) database was likewise detected, while a concurrent effort was made to compromise the Indian Air Force Placement Organisation portal.

All four sites were promptly isolated, and restorative action was undertaken; no operational or classified networks were affected at any stage.

These brazen cyberattacks are part of a broader pattern of provocation by Pakistan, which has long employed terrorism and information warfare against India. It appears that Pakistan is testing India’s restraint and patience.

Meanwhile, the Pakistan Army resorted to unprovoked small arms firing across the Line of Control for the eighth day of the night of May 1 and the early hours of May 2. Indian Army has effectively responded to the unprovoked firing in areas opposite Kupwara, Baramulla, and Poonch districts, as well as in the Naushera and Akhnoor sectors in Jammu and Kashmir (J-K). The firing started on April 25 days after the Pahalgam Terror attack in which 26 tourists were killed.

According to the Indian Army, the troops responded in a calibrated and proportionate manner to the unprovoked small arms firing by the Pakistan Army. (ANI)

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

We use cookies to give you the best online experience. By agreeing you accept the use of cookies in accordance with our cookie policy.

Privacy Settings saved!
Privacy Settings

When you visit any web site, it may store or retrieve information on your browser, mostly in the form of cookies. Control your personal Cookie Services here.

These cookies are essential in order to enable you to move around the website and use its features. Without these cookies basic services cannot be provided.

Cookie generated by applications based on the PHP language. This is a general purpose identifier used to maintain user session variables. It is normally a random generated number, how it is used can be specific to the site, but a good example is maintaining a logged-in status for a user between pages.
  • PHPSESSID

Used on sites built with Wordpress. Tests whether or not the browser has cookies enabled
  • wordpress_test_cookie

In order to use this website we use the following technically required cookies
  • wordpress_test_cookie
  • wordpress_logged_in_
  • wordpress_sec

Decline all Services
Accept all Services
0
Would love your thoughts, please comment.x
()
x