Amidst the G20 Summit in New Delhi, a new front is taking shape in the realm of cyberspace. Indonesia and Pakistan are leading a united front in a cutting-edge cyber campaign called ‘#OpIndia,’ strategically aimed at numerous Indian government websites. However, Indian hacktivist groups are not sitting idle.
The Rise of Indian Cyber Force (ICF)
The Rise of Indian Cyber Force (ICF) The Indian Cyber Force, also known as ICF, has emerged as a powerful and effective deterrent against cyber threats. The group has:
The Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have released a joint Cybersecurity Advisory...
Cisco has released a security advisory concerning a critical privilege escalation vulnerability (CVE-2025-20156) in its Meeting Management software. With a...
Attackers are pretending to be Ukraine's Computer Emergency Response Team (CERT-UA) using AnyDesk to access target computers. “Unidentified individuals are...
In another noteworthy move, ICF responded by retaliating against ‘Kopassus.mil.id,’ the domain of the Indonesian Army, effectively forcing it offline. Moreover, the group successfully disrupted the functioning of the Indonesian Embassy website, temporarily rendering it inaccessible for approximately 35 minutes.
Team NWH Joins the Fray
ICF is not fighting this cyber battle alone. Team NWH, yet another Indian hacking group, has also rolled up their sleeves and joined the fray. They have:
Orchestrated DDoS attacks on the Bangladesh government’s services portal
Retaliated against Pakistani police websites, including sindhpolice.gov.pk and balochistanpolice.gov.pk
Telegram Steps In
Telegram has taken a momentous step by banning all hacking groups that are anti-India from its platform. Indonesian, Pakistani, and Bangladeshi channels are no longer available in India. These channels can still be accessed outside of India. As a result, these groups are moving to platforms like Twitter. Stay tuned for more updates as we continue to cover this riveting story.
(Media Disclaimer: This report relies on a combination of internal and external research gathered through diverse channels. It is important to note that the information presented here is intended solely for reference, and users are entirely accountable for their reliance on it. Infosecbulletin disclaims any responsibility for the accuracy or potential outcomes resulting from the use of this information.)