Amidst the G20 Summit in New Delhi, a new front is taking shape in the realm of cyberspace. Indonesia and Pakistan are leading a united front in a cutting-edge cyber campaign called ‘#OpIndia,’ strategically aimed at numerous Indian government websites. However, Indian hacktivist groups are not sitting idle.
The Rise of Indian Cyber Force (ICF)
The Rise of Indian Cyber Force (ICF) The Indian Cyber Force, also known as ICF, has emerged as a powerful and effective deterrent against cyber threats. The group has:
Bitdefender has released a decryptor for the ShrinkLocker ransomware after months of concern from responders regarding attacks involving this malware....
Microsoft's latest Patch Tuesday update fixes 89 security vulnerabilities. Four of these are zero-day vulnerabilities, with two currently being exploited....
Russia's media censor, Roskomnadzor, has blocked thousands of local websites using Cloudflare's encryption feature that enhances online privacy and security....
In another noteworthy move, ICF responded by retaliating against ‘Kopassus.mil.id,’ the domain of the Indonesian Army, effectively forcing it offline. Moreover, the group successfully disrupted the functioning of the Indonesian Embassy website, temporarily rendering it inaccessible for approximately 35 minutes.
Team NWH Joins the Fray
ICF is not fighting this cyber battle alone. Team NWH, yet another Indian hacking group, has also rolled up their sleeves and joined the fray. They have:
Orchestrated DDoS attacks on the Bangladesh government’s services portal
Retaliated against Pakistani police websites, including sindhpolice.gov.pk and balochistanpolice.gov.pk
Telegram Steps In
Telegram has taken a momentous step by banning all hacking groups that are anti-India from its platform. Indonesian, Pakistani, and Bangladeshi channels are no longer available in India. These channels can still be accessed outside of India. As a result, these groups are moving to platforms like Twitter. Stay tuned for more updates as we continue to cover this riveting story.
(Media Disclaimer: This report relies on a combination of internal and external research gathered through diverse channels. It is important to note that the information presented here is intended solely for reference, and users are entirely accountable for their reliance on it. Infosecbulletin disclaims any responsibility for the accuracy or potential outcomes resulting from the use of this information.)