{"id":72368,"date":"2011-12-06T13:01:15","date_gmt":"2011-12-06T13:01:15","guid":{"rendered":"https:\/\/localhost\/wordpress\/?p=72368"},"modified":"2011-12-06T13:01:15","modified_gmt":"2011-12-06T13:01:15","slug":"bsnl-website-gets-hacked","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/bsnl-website-gets-hacked\/","title":{"rendered":"BSNL website gets hacked"},"content":{"rendered":"<div><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/archive\/images2.jpg\" alt=\"\" width=\"100\" height=\"100\" \/>The Government owned <strong>Bharat Sanchar Nigam Limited <\/strong>(BSNL &#8211; the leading Indian telecommunication company) website has suffered yet another hacker attack. This time it was in the early hours of Sunday (December 4, 2011).<\/p>\n<p>After the hacking a message appeared on the site &#8211; &#8220;Your site Security is Shit and if you Dont Update We will meet here&#8221;.<\/p>\n<p>It has been confirmed that personal details of subscribers, including names, email addresses and phone numbers have been hacked by the group.<\/p>\n<p>It came to notice at 2:21 AM on December 4th, 2011 that these details have been obtained by the group.<\/p>\n<p>The hacker groups site has announced that the attack was carried out by five of its members identified by their ID&#8217;s: aliases x-c0p, nginx-adm1n, enc0der, k3rnel and sm0ky.<\/p>\n<p>As a result, BSNL has restored its website after carrying out investigations. The website is now functioning properly.<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The Government owned Bharat Sanchar Nigam Limited (BSNL &#8211; the leading Indian telecommunication company) website has suffered yet another hacker attack. This time it was in the early hours of Sunday (December 4, 2011). After the hacking a message appeared on the site &#8211; &#8220;Your site Security is Shit and if you Dont Update We [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[58,25,38],"class_list":["post-72368","post","type-post","status-publish","format-standard","hentry","category-news","tag-hacking","tag-phishing","tag-vulnerability"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72368"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=72368"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/72368\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=72368"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=72368"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=72368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}