Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Anonymous India Strikes Back

Uday Mittal September 28, 2015 Leave a Comment

Anonymous India Strikes Back

Whether it’s cricket ground or battle-ground, things always heat up when the two sides are India and Pakistan. Off late, they’ve found a new frontier to battle, the cyber-ground. Both the nations have been in the state of unofficial cyber-warfare since 2010 and it doesn’t seem to end any time soon.

Yesterday, a Pakistani hacker by the name of  Faisal Afzal (Faizal 1337) defaced Kerala government’s website kerala.gov.in. The hacked website displayed a burning Indian flag along with the message, ‘Pakistan Zindabad’. Outraged by this, Indian hacktivist groups, collectively known as Anonymous India, decided to launch a payback operation named #OpPAKPayback. Through this operation they hacked, defaced and DDoSed over fifty Pakistani websites. A classic tit for tat.

As per the message displayed on defaced Pakistani websites, Anonymous India seems to include following hacktivist groups:

  • cy83r_p1r4735
  • Hell Shield Hackers
  • Team Hind Hackers
  • Mallu Cyber Soldiers

M Soldiers

 

Related Posts

  • Book Review: Cyber Warfare – Truth, Tactics, and StrategiesBook Review: Cyber Warfare – Truth, Tactics, and Strategies
  • Would Trump trump his promise on Cybersecurity?Would Trump trump his promise on Cybersecurity?
mm
Uday Mittal

Uday Mittal is a cybersecurity professional with rich working experience working with various industries including telecom, publishing, consulting and finance. He holds internationally recognized certifications such as CRTP, OSCE, OSCP, CISSP, CISA, CISM, CRISC among others. He speaks on cybersecurity awareness, offensive security research etc. and has authored various articles on topics related to cyber security and software development for a leading magazine on open source software.

Filed Under: Hacks Tagged With: anonymous india, cyber-warfare, hacktivists, hell shield hackrs, mallu cyber soldiers

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Are you sharing sensitive information over WhatsApp?
    Are you sharing sensitive information over WhatsApp?
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress