logo
Cyberattacks surge amid India-Pakistan clashes after strikes

Cyberattacks surge amid India-Pakistan clashes after strikes

Techday NZ14-05-2025
Cyberattacks by hacktivist groups have escalated following renewed tensions between India and Pakistan.
On May 7, 2025, India conducted "Operation Sindoor," a series of 24 missile strikes over 25 minutes against nine sites described as "terrorist infrastructure" in Pakistan and the Pakistan-administered region of Kashmir. According to Indian authorities, this operation was a response to the mass killing of 26 Indian tourists in Kashmir on 22 April. While India claims the strikes killed more than 70 militants and avoided civilian areas, Pakistan alleges at least 26 civilian casualties, has vowed to respond, and reports shooting down five Indian jets. Subsequent artillery exchanges have been reported along the Line of Control, closures of airspace have occurred, and international actors have called for restraint.
In anticipation of cyber reprisal, India moved to temporarily block overseas users from accessing the websites of the National Stock Exchange and BSE. Officials cited cyberthreat concerns as the reason for the move, affirming that trading operations remain unaffected, though access is being controlled while risks are evaluated. Indian media outlets have documented a rise in hacking claims linked to Pakistan, and Pakistan's cyber response agency, PKCERT, has warned that hostile actors are exploiting the escalation to spread disinformation and attack critical systems.
Reports compiled by Radware indicate that India has remained a frequent target of hacktivist campaigns throughout 2025, with 26 different groups targeting 100 organisations and accounting for 256 Distributed Denial of Service (DDoS) attacks since January. Most attacks were concentrated in January, but the initial week of May has seen activity accelerate as geopolitical tensions have heightened.
According to Radware, RipperSec has been responsible for over 30% of DDoS claims against Indian targets this year, followed by AnonSec (16.8%), Keymous+ (10.2%), Sylhet Gang (9%), and Mr Hamza (4.7%). Groups such as Anonymous VNLBN, Bangladesh Civilian Force, SPIDER-X, RuskiNet, Arabian Ghosts, AnonPioneers, Rabbit Cyber Team, Red Wolf Cyber, Nation of Saviors, and several others have also made claims of responsibility. Hacktivists on both sides are employing various methods, from DDoS attacks and botnets to website defacements and data leaks, with the objective of disrupting service and undermining public confidence.
More than half of the claimed DDoS attacks have targeted governmental agencies, with other significant targets including entities in education (8.3%), finance (7.4%), manufacturing (6.5%), and telecommunications (6.5%).
Since the events of May 7, DDoS attack activity aimed at India has intensified. Radware's analysis notes a spike at 4pm UTC (9:30pm IST) with up to seven claimed attacks per hour. Threat actors involved in these attacks include AnonSec, Keymous+, Mr Hamza, Anonymous VNLBN, Arabian Hosts, Islamic Hacker Army, Sylhet Gang, Red Wolf Cyber, and the Iranian group Vulture.
In these attacks post-Operation Sindoor, more than 75% of the incidents were directed at government agencies, while the financial and telecom sectors accounted for 8.5% and 6.4% respectively, comprising the bulk of the activity observed.
"Politically, socially and religiously motivated hacktivist groups are increasingly coordinating efforts, amplifying their attacks against shared adversaries," Radware said in its latest alert. "Hacktivists are using hybrid strategies, leveraging application-layer and volumetric DDoS attacks that complicate defences."
The Radware alert continued: "Hacktivists on both sides are targeting critical infrastructure using Web DDoS attacks, botnets, data leaks, and defacements, aiming to disrupt services and erode public trust."
Recent developments show several groups, including Sylhet Gang, Mysterious Team, and Red Wolf Cyber, declaring support for Pakistan and threatening expanded attacks on Indian systems. Radware observed that since 2024, there has been a growing pattern of collaboration among groups with different ideological motivations. "As noted in the Radware 2025 Global Threat Analysis Report, 2024 was a significant turning point for hacktivist alliances, as groups driven by different political, social and religious motivations united in coordinated campaigns to target shared perceived adversaries. In 2025, this trend has gained momentum, with more hacktivists offering mutual support for each other's actions and campaigns, amplifying their messages and boosting their visibility."
The alert further stated: "In the wake of Operation Sindoor, new alliances are emerging among Southeast Asian hacktivists. Some of these alliances even extend to groups traditionally opposed to Israel, such as the Iranian hacktivist group Vulture."
The situation, as described by Radware, remains volatile. "As of now, less than 24 hours have passed since the escalation between India and Pakistan, and the situation remains highly volatile. Several prominent politically motivated groups, such as RipperSec and Mysterious Team Pakistan, have publicly pledged to take action but have not yet claimed responsibility for any attacks. Their impending involvement could significantly raise the stakes."
Hacktivist groups based in India are also expected to intensify activity, raising concerns about reciprocal cyberattacks on Pakistani infrastructure. "Simultaneously, hacktivist groups supporting India, such as Indian Cyber Force, Cryptojackers of India, Dex4o4 and Ghost Force are expected to intensify their efforts to target Pakistani organisations. This could create a dangerous cycle of retaliation, increasing the risk of further cyberattacks, potentially targeting critical infrastructure on both sides."
The tactics used by hacktivists are varied. "Hacktivists frequently deploy application-layer DDoS attacks to target specific server resources, often without generating overwhelming traffic volumes. These attacks are harder to detect and mitigate, as they imitate legitimate user interactions. Common techniques include HTTPS encrypted floods and form POSTs, which overwhelm online services and their backend systems. This can result in significant service disruptions or even complete outages, especially for critical websites like government portals, financial institutions or news outlets."
"Volumetric attacks, while generally less sophisticated, are still a common strategy employed by hacktivist groups to overwhelm network infrastructure. These attacks often involve tactics such as direct path UDP floods or reflection and amplification attacks, where the target is flooded with a massive volume of UDP packets. This consumes significant bandwidth and network resources, which can potentially bring down online services or impact connectivity."
"Given the increasing sophistication of and orchestration between hacktivist groups, hybrid DDoS attacks that combine multiple techniques can be observed. These attacks could simultaneously target network infrastructure with volumetric methods while also executing application-layer attacks. These strategies complicate detection and mitigation efforts."
Radware highlighted the accessibility of DDoS tools as a contributing factor, noting: "Many groups may use publicly available DDoS tools to conduct their attacks. RipperSec members, for example, maintain and share a tool called MegaMedusa. Built using Node.js, MegaMedusa leverages its asynchronous and non-blocking I/O capabilities to manage multiple network connections efficiently, making it suitable for orchestrating extensive DDoS campaigns. The tool is publicly accessible via GitHub, allowing users to install and operate it with minimal technical expertise. Its user-friendly installation process involves executing a few commands, making it accessible even to individuals with limited technical backgrounds. The availability of these tools makes it easier for groups with varying levels of technical expertise to launch impactful attacks."
"Hacktivist groups may also utilise botnets – networks of compromised devices, often IoT devices – to launch large-scale DDoS attacks. These botnets can be rented or created through the use of malware, enabling attackers to distribute traffic across a wide range of devices. Some hacktivist groups have evolved from politically and religiously motivated attackers to DDoS-as-a-service providers, offering these services either for a fee or in exchange for advertising on their Telegram channels."
"Some hacktivists may also engage in website defacements and claim responsibility for data leaks as part of their strategy to create chaos and erode public trust in institutions. These actions are often intended to undermine the credibility of targeted organisations and spread ideological messages."
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

AI drives 80 percent of phishing with USD $112 million lost in India
AI drives 80 percent of phishing with USD $112 million lost in India

Techday NZ

timea day ago

  • Techday NZ

AI drives 80 percent of phishing with USD $112 million lost in India

Artificial intelligence has become the predominant tool in cybercrime, according to recent research and data from law enforcement and the cybersecurity sector. AI's growing influence A June 2025 report revealed that AI is now utilised in 80 percent of all phishing campaigns analysed this year. This marks a shift from traditional, manually created scams to attacks fuelled by machine-generated deception. Concurrently, Indian police recorded that criminals stole the equivalent of USD $112 million in a single state between January and May 2025, attributing the sharp rise in financial losses to AI-assisted fraudulent operations. These findings are reflected in the daily experiences of security professionals, who observe an increasing use of automation in social engineering, malware development, and reconnaissance. The pace at which cyber attackers are operating is a significant challenge for current defensive strategies. Methods of attack Large language models are now being deployed to analyse public-facing employee data and construct highly personalised phishing messages. These emails replicate a victim's communication style, job role and business context. Additionally, deepfake technology has enabled attackers to create convincing audio and video content. Notably, an incident in Hong Kong this year saw a finance officer send HK $200 million after participating in a deepfake video call bearing the likeness of their chief executive. Generative AI is also powering the development of malware capable of altering its own code and behaviour within hours. This constant mutation enables it to bypass traditional defences like endpoint detection and sandboxing solutions. Another tactic, platform impersonation, was highlighted by Check Point, which identified fake online ads for a popular AI image generator. These ads redirected users to malicious software disguised as legitimate installers, merging advanced loader techniques with sophisticated social engineering. The overall result is a landscape where AI lowers the barriers to entry for cyber criminals while amplifying the reach and accuracy of their attacks. Regulatory landscape Regulators are under pressure to keep pace with the changing threat environment. The European Union's AI Act, described as the first horizontal regulation of its kind, became effective last year. However, significant obligations affecting general-purpose AI systems will begin from August 2025. Industry groups in Brussels have requested a delay on compliance deadlines due to uncertainty over some of the rules, but firms developing or deploying AI will soon be subject to financial penalties for not adhering to the regulations. Guidance issued under the Act directly links the risks posed by advanced AI models to cybersecurity, including the creation of adaptive malware and the automation of phishing. This has created an expectation that security and responsible AI management are now interrelated priorities for organisations. Company boards are expected to treat the risks associated with generative models with the same seriousness as data protection or financial governance risks. Defensive measures A number of strategies have been recommended in response to the evolving threat environment. Top of the list is the deployment of behaviour-based detection systems that use machine learning in conjunction with threat intelligence, as traditional signature-based tools struggle against ever-changing AI-generated malware. Regular vulnerability assessments and penetration testing, ideally by CREST-accredited experts, are also regarded as essential to expose weaknesses overlooked by both automated and manual processes. Verification protocols for audio and video content are another priority. Using additional communication channels or biometric checks can help prevent fraudulent transactions initiated by synthetic media. Adopting zero-trust architectures, which strictly limit user privileges and segment networks, is advised to contain potential breaches. Teams managing AI-related projects should map inputs and outputs, track possible abuse cases, and retain detailed logs in order to meet audit obligations under the forthcoming EU regulations. Staff training programmes are also shifting focus. Employees are being taught to recognise subtle cues and nuanced context, rather than relying on spotting poor grammar or spelling mistakes as indicators of phishing attempts. Training simulations must evolve alongside the sophistication of modern cyber attacks. The human factor Despite advancements in technology, experts reiterate that people remain a core part of the defence against AI-driven cybercrime. Attackers are leveraging speed and scale, but defenders can rely on creativity, expertise, and interdisciplinary collaboration. "Technology alone will not solve AI‑enabled cybercrime. Attackers rely on speed and scale, but defenders can leverage creativity, domain expertise and cross‑disciplinary thinking. Pair seasoned red‑teamers with automated fuzzers; combine SOC analysts' intuition with real‑time ML insights; empower finance and HR staff to challenge 'urgent' requests no matter how realistic the voice on the call," said Himali Dhande, Cybersecurity Operations Lead at Borderless CS. The path ahead There is a consensus among experts that the landscape has been permanently altered by the widespread adoption of AI. It is increasingly seen as necessary for organisations to shift from responding to known threats to anticipating future methods of attack. Proactive security, embedded into every project and process, is viewed as essential not only for compliance but also for continued protection. Borderless CS stated it, "continues to track AI‐driven attack vectors and integrate them into our penetration‐testing methodology, ensuring our clients stay ahead of a rapidly accelerating adversary. Let's shift from reacting to yesterday's exploits to pre‐empting tomorrow's."

Who is Zohran Mamdani? The NYC mayoral hopeful's stunning rise
Who is Zohran Mamdani? The NYC mayoral hopeful's stunning rise

1News

time3 days ago

  • 1News

Who is Zohran Mamdani? The NYC mayoral hopeful's stunning rise

When he announced his run for mayor back in October, Zohran Mamdani was a state lawmaker unknown to most New York City residents. Last week, the 33-year-old marked his stunning political ascension when he declared victory in the Democratic primary from a Queens rooftop bar after former New York Governor Andrew Cuomo conceded. While the race's ultimate outcome has yet to be confirmed by a ranked-choice count scheduled for July 1, here's a look at the one-time rapper seeking to become the city's first Muslim and Indian American mayor, and its youngest mayor in generations. Mamdani's mother is a famous filmmaker Mamdani was born in Kampala, Uganda, to Indian parents and became an American citizen in 2018, shortly after graduating from college. He lived with his family briefly in Cape Town, South Africa, before moving to New York City when he was 7. ADVERTISEMENT Mamdani's mother, Mira Nair, is an award-winning filmmaker whose credits include 'Monsoon Wedding,' 'The Namesake' and 'Mississippi Masala.' His father, Mahmood Mamdani, is an anthropology professor at Columbia University. Democratic mayoral candidate Zohran Mamdani takes the stage at his primary election party, Wednesday, June 25, 2025, in New York (Source: Associated Press) Mamdani married Rama Duwaji, a Syrian American artist, earlier this year. The couple, who met on the dating app Hinge, live in the Astoria section of Queens. Mamdani was once a fledgling rapper Mamdani attended the Bronx High School of Science, where he cofounded the public school's first cricket team, according to his legislative bio. ADVERTISEMENT He graduated in 2014 from Bowdoin College in Maine, where he earned a degree in Africana studies and cofounded his college's Students for Justice in Palestine chapter. After college, he worked as a foreclosure prevention counsellor in Queens, helping residents avoid eviction, the job he says inspired him to run for public office. Democratic mayoral candidates Adrienne Adams, Brad Lander, Jessica Ramos, Zellnor Myrie, Andrew Cuomo, Whitney Tilson, Zohran Mamdani, Michael Blake and Scott Stringer participate in a Democratic mayoral primary debate (Source: Associated Press) Mamdani also had a notable side hustle in the local hip-hop scene, rapping under the moniker Young Cardamom and later Mr. Cardamom. During his first run for state lawmaker, Mamdani gave a nod to his brief foray into music, describing himself as a 'B-list rapper." 'Nani,' a song he made in 2019 to honor his grandmother, even found new life -- and a vastly wider audience -- as his mayoral campaign gained momentum. His critics, meanwhile, have seized on lyrics from 'Salaam," his 2017 ode to being Muslim in New York, to argue his views are too extreme for New Yorkers. ADVERTISEMENT Early political career Mamdani cut his teeth in local politics working on campaigns for Democratic candidates in Queens and Brooklyn. He was first elected to the New York Assembly in 2020, knocking off a longtime Democratic incumbent for a Queens district covering Astoria and surrounding neighbourhoods. He has handily won reelection twice. The Democratic Socialist's most notable legislative accomplishment has been pushing through a pilot program that made a handful of city buses free for a year. He's also proposed legislation banning nonprofits from 'engaging in unauthorised support of Israeli settlement activity.' Mamdani's opponents, particularly Cuomo, have dismissed him as woefully unprepared for managing the complexities of running America's largest city. But Mamdani has framed his relative inexperience as a potential asset, saying in a mayoral debate he's 'proud' he doesn't have Cuomo's 'experience of corruption, scandal and disgrace.' ADVERTISEMENT Viral campaign videos Mamdani has used buzzy campaign videos — many with winking references to Bollywood and his Indian heritage — to help make inroads with voters outside his slice of Queens. On New Year's Day, he took part in the annual polar plunge into the chilly waters off Coney Island in a full dress suit to break down his plan to 'freeze' rents. As the race was entering the final stretch, Mamdani walked the length of Manhattan, documenting the roughly 21-kilometre trip by posting photos and videos of his interactions along the way. In TikTok videos, he's even appealed to voters of colour by speaking in Spanish, Bangla and other languages. Progressive promises Mamdani has offered a more optimistic vision, in contrast to candidates like Cuomo, who have largely focused on crime and law and order issues. ADVERTISEMENT His campaign has been packed with big promises aimed at lowering the cost of living for everyday New Yorkers, from free child care, free buses, a rent freeze for people living in rent-regulated apartments and new affordable housing – much of it by raising taxes on the wealthy. The big promises have, unsurprisingly, endeared him to the Democratic Party's liberal wing. Mamdani secured endorsements from two of the country's foremost progressives, U.S. Rep. Alexandria Ocasio-Cortez, of New York, and Sen Bernie Sanders of Vermont. Pro-Palestinian views Mamdani's outspoken support for Palestinian causes was a point of tension in the mayor's race as Cuomo and other opponents sought to label his defiant criticism of Israel as antisemitic. The Shia Muslim has called Israel's military campaign in Gaza a 'genocide' and said the country should exist as 'a state with equal rights,' rather than a 'Jewish state.' That message has resonated among pro-Palestinian residents, including the city's roughly 800,000 adherents of Islam — the largest Muslim community in the country. During an interview on CBS's 'The Late Show' on the eve of the election, host Stephen Colbert asked Mamdani if he believed the state of Israel had the right to exist. He responded: 'Yes, like all nations, I believe it has a right to exist — and a responsibility also to uphold international law.' ADVERTISEMENT Mamdani's refusal to condemn calls to 'globalise the intifada' on a podcast — a common chant at pro-Palestinian protests — drew recriminations from Jewish groups and fellow candidates in the days leading up to the election. In his victory speech Tuesday, he pledged to work closely with those who don't share his views on controversial issues. 'While I will not abandon my beliefs or my commitments, grounded in a demand for equality, for humanity, for all those who walk this earth, you have my word to reach further, to understand the perspectives of those with whom I disagree, and to wrestle deeply with those disagreements,' Mamdani said.

Blackmail complaint made to police: Taxi driver left stressed by supposed' prank'
Blackmail complaint made to police: Taxi driver left stressed by supposed' prank'

Otago Daily Times

time4 days ago

  • Otago Daily Times

Blackmail complaint made to police: Taxi driver left stressed by supposed' prank'

Gurpreet Singh. PHOTO: GREGOR RICHARDSON A Dunedin Taxis driver says he was left shivering and in tears after believing he was being "blackmailed" for $10,000 by two fellow drivers. The driver said former Dunedin Taxis director Gurpreet Singh and driver Vishal Vala demanded the payment be made to an Indian bank account in March to alter log books. He claims he was told if he did not make the payment he would be fired. When he complained to Dunedin Taxis chairman Paul Oliver and the police, he was told the incident was just a prank — an explanation which he doubted. The driver, who provided texts and emails to the Otago Daily Times, said he felt forced to withdraw the complaints, but said the ordeal left him scared of Mr Singh, who is still a driver for the company. "I still can't make any sense of this whole incident, that's why was I intimidated," he said in communication supplied to the ODT. "[I felt] threatened, emotionally blackmailed and financially blackmailed. "Tears are rolling down my eyes — I am stressed, I feel betrayed, I am shivering, and I couldn't sleep for the whole night." When approached by the ODT, Mr Singh and Mr Vala stood by their explanation the incident was a prank they regretted. Mr Vala said the prank took place while the pair were drunk. The driver said the incident happened after Mr Singh and Mr Vala befriended him when he first joined Dunedin Taxis, and claims the pair introduced him to their system of getting preference for big-ticket rides. They told him they had an arrangement with a staff member at the Dunedin Taxis call centre to allocate them the more expensive trips that came through the system — which was against the constitution of the company. The driver said he took a few of those rides after believing Mr Singh had set them up for him. On March 14, the driver claims Mr Singh told him that Dunedin Taxis had a record of those rides and they needed to be deleted from the company's system or else he would lose his job. The driver alleges Mr Singh had told him to make a $10,000 deposit into an Auckland-based staff member's Indian account to wipe logbook records. At this point, the driver was scared and refused to take part in the arrangement. The driver complained to Dunedin Taxis chairman Mr Oliver and to the police on the evening of March 14. The following day the driver received an apology from both Mr Singh and Mr Vala. Mr Singh wrote: "I'm really sorry for the prank — I misjudged it and I regret that it didn't come across as harmless fun. Mr Vala wrote: "I never imagined it would affect you that way, especially since we used to be good friends". The driver responded to a separate apology Mr Singh made on WhatsApp by saying he had "lost all respect" for the pair. He highlighted he was "shocked and shivering" after their threats. Mr Singh responded to him by saying "GOOD THOUGHTS FROM CHAT GPT" and "U can f... off". The driver said he ended up in the emergency department at the hospital with high blood pressure The driver said the incident left him feeling unsafe working for Dunedin Taxis, and he was not happy with the response from the company to his complaint. When questioned by the ODT, Mr Singh reiterated the incident was a prank and denied allegations of blackmail and any involvement in a scheme to give drivers preferential treatment for big ticket rides. He said the matter was amicably resolved with the help of two fellow drivers, and the police complaint was withdrawn. Mr Vala also denied the allegations. He said he had been drinking with Mr Singh when they decided to prank call the driver. "We did not know he would take it so seriously." Mr Vala thought the matter had been resolved within the company and said he was told no further action would be taken. Mr Oliver said he told the driver he could not do anything about the complaints against Mr Singh and Mr Vala because the driver had already taken the issue to police. "That was the end of it for me. "Whether there was $10,000 or whatever it was, it's just no longer my problem or concern ... it had nothing to do with taxi operations." He said after the complaint was withdrawn from police he thought the driver and Mr Singh and Mr Vala were friends again, and he did not have to take any further action. He said it was impossible to wipe any logbook records. "Unless they go up to Auckland and break into the place and do a Watergate, that's impossible." He said there were constant complaints some drivers were getting better rides than others, but the system could not be worked improperly.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store