{"id":77217,"date":"2013-11-21T19:15:47","date_gmt":"2013-11-21T13:45:47","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=77217"},"modified":"2013-11-21T19:15:47","modified_gmt":"2013-11-21T13:45:47","slug":"cyber-crimes-against-india-increasing-in-leaps-and-bounds","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/cyber-crimes-against-india-increasing-in-leaps-and-bounds\/","title":{"rendered":"Cyber Crimes against India &#8211; Increasing in Leaps and Bounds"},"content":{"rendered":"<p>Reportedly, India happens to be the 4<sup>th<\/sup> most favorite target of cyber criminals when it comes to phishing attacks. This fact is vouched by the number of cyber attacks hitting the country, which has scaled exponentially in 2013.<\/p>\n<p><span style=\"font-size: 16px; color: #006600;\">Here are some findings by the Indian Computer Emergency Response Team (CERT-In)<\/span><\/p>\n<p><span style=\"font-size: 15px; color: #ff6600;\">Number of Indian Websites defaced and hacked in 2013<\/span>:<br \/>\nAugust \u2013 4,191<br \/>\nJuly \u2013 2,380<br \/>\nJune \u2013 2,858<br \/>\nMay \u2013 1,808<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/cyber_attacks_against_India1.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-77221 aligncenter\" alt=\"cyber_attacks_against_India\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/cyber_attacks_against_India1.png\" width=\"563\" height=\"291\" \/><\/a><\/p>\n<p>Most of these compromised Websites belong to the .in domain, whose servers are located in India.<\/p>\n<p><span style=\"font-size: 16px; color: #ff6600;\">List of Offenders<\/span><br \/>\nSome of the main cyber crooks that India is dealing with presently are:<\/p>\n<ul>\n<li>SA3D HaCk3D<\/li>\n<li>h4x0r HuSsY<\/li>\n<li>SanFour2S<\/li>\n<li>BD GREY HAT HACKERS<\/li>\n<li>Suwario<\/li>\n<li>SpyDy<\/li>\n<li>hasnain haxor<\/li>\n<li>CouCouM<\/li>\n<\/ul>\n<p><span style=\"font-size: 16px; color: #ff6600;\">Agenda behind the Cyber Attacks<\/span><br \/>\nThese cyber attacks that have been happening are aimed towards:<\/p>\n<ol>\n<li>Stealing passwords<\/li>\n<li>Attacking data-driven applications<\/li>\n<li>Launching man-in-the-middle attacks<\/li>\n<li>Web shell loading<\/li>\n<\/ol>\n<p><span style=\"font-size: 16px; color: #ff6600;\">What is being done to contain the situation?<\/span><br \/>\nIf we are to believe what the National Security Council Secretariat (NSCS) has to say, then the situation is grim. The Indian Cabinet did initiate a cyber security architecture, but it did not prove to be promising; it showed very little progress. But Indian does have a roadmap where bodies such as the National Technical Research Organisation and defence and home ministries will play intertwined role in the nation\u2019s cyber protection. And this pyramid will be head by CERT-In, as the overlooker.<\/p>\n<p><span style=\"font-size: 16px; color: #ff6600;\">More Expectations from Homegrown Security Solutions<\/span><br \/>\nThe government has expressed its interest in deploying homegrown security software rather than foraging for software developed elsewhere.<\/p>\n<p>In the wake of the increasing cyber attacks in the country, and given the government\u2019s interest in indigenous software, Quick Heal strives to stand out in the crowd. Its Unified Threat Management solution christened <a href=\"https:\/\/www.quickheal.co.in\/quick-heal-terminator-network-security\" target=\"_blank\">Terminator <\/a>has all that is required to counter such threats. This software has been developed with the aim to make the IT infrastructure of an enterprise stable, secure, and productive.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/quick_heal_terminator_unified_threat_management1.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-77223 aligncenter\" alt=\"quick_heal_terminator_unified_threat_management\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/11\/quick_heal_terminator_unified_threat_management1.png\" width=\"719\" height=\"314\" \/><\/a><\/p>\n<p>You can <a href=\"https:\/\/bitcast-b.bitgravity.com\/quickheal\/documents\/UTM.pdf\">download<\/a> Terminator\u2019s Data Sheet to get an in-depth analysis on its features and how they work to protect enterprise network.<\/p>\n<p><span style=\"color: #666666;\">Data source:<br \/>\narticles.timesofindia.indiatimes.com<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reportedly, India happens to be the 4th most favorite target of cyber criminals when it comes to phishing attacks. This fact is vouched by the number of cyber attacks hitting the country, which has scaled exponentially in 2013. Here are some findings by the Indian Computer Emergency Response Team (CERT-In) Number of Indian Websites defaced [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":77339,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[164,289,153,171,133],"tags":[757,758,179,759,699,760,451],"class_list":["post-77217","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-crime","category-cyber-safety","category-cyberwar","category-enterprise","category-hacker","tag-cert-in","tag-cyber-attacks","tag-enterprise","tag-enterprise-it-security","tag-india","tag-quick-heal-terminator","tag-unified-threat-management"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77217"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=77217"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/77217\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=77217"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=77217"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=77217"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}