Achive.php the cyber shark Archives - Page 5 of 18 - The Cyber Shark

Massive Facebook Data Leak Exposes 1.2 Billion User Records, Hacker Claims

Facebook Data

Facebook Data: A hacker claims to have leaked data from 1.2 billion Facebook users, including emails, phone numbers, and more. Researchers verified part of the sample, raising concerns about Meta’s data security and ongoing scraping issues. In response to Cyber News, Facebook’s parent company, Meta, sent a brief message along with a link to a newsroom article from four years ago titled “How we combat scraping.” “This assertion is not new. A Meta representative stated, “We revealed this years ago and have since taken action to stop such events from occurring. Meanwhile, looked into a data sample that had information on 100,000 distinct Facebook user records that the attackers had added to the post. The data seems valid based on the contents of the sample rather than the entire dataset. The team claims that the dataset consists of: User IDs Names Email addresses Usernames Phone numbers Locations Birthdays Genders Researchers advise exercising caution regarding the veracity of the attacker’s claims regarding “1.2 billion Facebook user records,” despite the fact that they are remarkable. For starters, this is only the second post the attackers have ever made that contains alleged Facebook records that were scraped. Although the quantity was substantially smaller, data purportedly collected from Facebook was also included in another attacker’s post. Researchers speculated that after publishing one post, they were able to extract further data to reach 1.2 billion entries. The social networking site would flag another case of user data being scraped in bulk if the Facebook data scrape were verified. According to the team, this calls into doubt the company’s stance on the protection of consumers’ personal information. Recurring incidents indicate a tendency toward reactive security measures as opposed to proactive ones, especially when it comes to safeguarding critical yet publicly accessible data. Millions may be vulnerable to phishing, scams, identity theft, and long-term privacy problems due to the absence of more robust protections and transparency, the researchers stated. A dataset of that size can be used in a variety of ways by threat actors since it makes it simple for hackers to automate attacks, releasing hordes of bots that target each user in the dataset with minimal human intervention. Since malicious actors are aware that the email addresses in the dataset belong to Facebook members, they can utilise one of the several Facebook phishing methods to target Facebook users. Threat actors frequently try to use APIs for malicious ends. Attackers targeted Shopify, GoDaddy, Wix, and OpenAI’s APIs earlier this year. Actors with financial motivations frequently try to misuse the same method to gain access to cryptocurrency wallets. “A pattern of reactive rather than proactive security measures is evident in repeated incidents, especially when it comes to safeguarding sensitive but publicly visible data.” Since APIs enable communication between various services, the majority of well-known services would not be possible without them. Attackers, however, manage to leverage lawful APIs for malicious ends, such as retrieving significantly more data than the software applications were designed to do. Facebook data scraping is not unheard of. For instance, Meta acknowledged last year that it had used publicly available Facebook and Instagram data to train its AI virtual assistant. In 2021, however, a different hacker shared details about more than 500 million Facebook users, including locations and phone numbers. The Irish Data Protection Commission (DPC), the European Union’s top data privacy body, fined Meta €265 million ($266 million) for the leak.

Google Experiments with Gemini AI to Help Users Get Instant App Insights on the Play Store

Gemini AI

Gemini AI: Google is testing a new AI feature on the Play Store called “Ask Play about this app,” allowing users to ask app-related questions and receive answers powered by Gemini. Currently, the feature is available to a limited number of users and only for select popular apps. In the Play Store, Google has started testing a new AI-powered feature that allows customers can ask questions about apps and get replies from Google’s Gemini. A new “Ask Play about this app” section has been showing up for some users on the information pages of specific apps, even though the functionality has not been publicised. This suggests that it is presently undergoing restricted testing. The “Ask Play about this app” option on Google: What’s new? The feature adds a new section called “Ask Play about this app” to app listing pages. A text input form and some pre-made sample queries pertinent to the particular app being examined are included. Questions like “How do I change my username?” along with “What do people like most about this app?” To get answers, users can either tap on one of the suggested questions or enter their own. Answers show up right beneath the text area, and as the sample queries change dynamically depending on past exchanges, you can ask follow-up questions. With the help of this conversational interface, consumers should find it simpler to obtain comprehensive information without having to read through app descriptions or reviews. The feature is probably driven by one of Google’s Gemini AI models, as seen by the section’s notable Gemini star emblem. Only a small number of users seem to have access to the feature thus far. Business Standard evaluated three Android smartphones, but only one of them had the “Ask Play about this app” feature.  Additionally, it only appears for a select few popular apps, such as WhatsApp, Spotify, X (formerly Twitter), Uber, and a few others.

OLX Fraud: The Hidden Threat in Online Bargains

OLX Fraud

OLX Fraud: OLX is one of the most popular websites to buy and sell used items. It is now the world’s most popular digital marketplace, with over 300 million users every month. However, fraud and scam incidents have increased along with its popularity. Cybercriminals deceive individuals into paying money by using fictitious postings and identities. The specifics of OLX scams are examined in this article, along with self-defence tips. OLX fraud: what is it? The term “OLX Fraud” describes a range of untrustworthy activities that happen on the OLX platform and related online classified sites, such as Click India and Quikr. The sale of fictitious goods like cars, bikes, furniture, and home electronics is the most prevalent scam.  This is how it usually goes: A scammer publishes a phoney advertisement offering a product at an oddly cheap cost. The advertisement makes use of photographs and descriptions that have been taken from real listings. The scammer explains the necessity to mail the items by claiming to be based in a foreign state or be a member of the army when a buyer contacts them. To start shipping, the con artist then asks for an upfront payment. The fraudster vanishes as soon as the money is transferred through internet banking or UPI. Due to the allure of a fantastic deal, many customers fall victim to these well-planned scams despite OLX’s cautions and notifications. Who Is Responsible for OLX Frauds? OLX frauds are usually committed by people or organisations using fictitious identities. They frequently: To gain trust, pretend to be army men. To seem legitimate, use stolen photos and phoney identification. Function beyond national or even global boundaries. To evade detection, these scammers frequently change their bank accounts and phone numbers. They occasionally participate in broader criminal networks that engage in a variety of cybercrimes. On the other hand, victims might be anyone from tech-savvy children to senior citizens, with an increasing number of incidents involving older people who are less knowledgeable about digital safety procedures. When Do Frauds on OLX Happen?  Although OLX frauds can occur at any time, they frequently increase during specific times: Holiday seasons, when bargains are sought after. Sales periods are at the end of the month or year. Lockdowns and pandemics, when it is less likely that physical verification will occur. Usually, the deception happens during a brief period of interaction. Scammers frequently create a sense of urgency by demanding cash and action right once. Where Do OLX Frauds Take Place? These frauds are not limited by geography. However, there is evidence that online shopping is more prevalent in urban areas. Major cities like Bengaluru, Mumbai, Delhi, Hyderabad, and Chennai are the places where cases are most commonly recorded. Internet classifieds sites like: Websites like Olx.com, Quikr.com, and Click India are commonly used by scammers, and fraud-related behaviour can migrate to social networking sites that advertise similar goods. What Leads to Fraud on OLX?  The primary reasons why OLX frauds occur so frequently are as follows: Lack of Awareness: Many consumers are unaware of how these scams operate. Simplicity of Anonymity: Scammers can easily build fake profiles. The Allure of a Bargain: Low prices inspire consumers to take quick action. Lack of Regulations: Online classified ads are not heavily regulated. Delayed Legal Action: It may be challenging to find and capture internet offenders. As cybercrimes get more sophisticated, users need to be better equipped with knowledge and defence tools. How Can OLX Fraud Be Spotted and Avoided? The following are a few warning signs and precautions: Warning Signs: Exceptionally affordable prices. The need to make an upfront payment. The seller states that they are stationed abroad or in the military. Asks for payment by QR codes, internet banking, or UPI. Refusal to allow product inspection or to meet in person.  Advice for Prevention: Always demand that the item be inspected before payment is made. Never divulge private banking information. Steer clear of transactions that call for scanning QR codes. Instead of using third-party messengers, use the OLX chat feature. Check for reviews and validate the seller’s profile. Where and How Can I Report Cyber Fraud?  Take these actions if you or someone you know has fallen victim to OLX fraud: Keep records on everything: Take screenshots of the product listing, the payment information, and the chat. Report to Cybercrime Authorities: To submit an online report, go to https://cybercrime.gov.in. For prompt assistance, dial the cybercrime helpline at 1930. Go to the police station or cybercrime cell that is closest to you. Use ISAC and T4C Assistance: Account freezing assistance is available from the Telangana Cyber Crimes Coordination Centre (T4C). To obtain immediate assistance, utilise the ISAC Cop Connect App. Real Case Example A Bengaluru man lost more than Rs. 2 lakh in an OLX QR code fraud in September 2024. The scammer pretended to be a buyer and deceived the victim into scanning a QR code to obtain money instead of sending it. Rather, money was taken out of the victim’s account. This example is a clear warning that cunning tactics can fool even tech-savvy people. About OLX: Company Overview Full Name:                Online exchange Founded:                  2006 Headquarters:          Amsterdam, Netherlands Founders:                 Alec Oxenford and Fabrice Grinda Parent Company:     Prosus (a division of Naspers) CEO (India):             Amit Kumar OLX India CIN:         U74900HR2009PTC053732 Employees:              2,500 globally Revenue:                  $2.98 billion (2022) Presence:                 Over 30 countries The Reaction of OLX to Fraud  OLX has put in place several security procedures, including: Verification of buyers and sellers. Safe chat capabilities. Reminders and cautions against paying in advance. Instruments for reporting questionable postings.  The best defence is still user vigilance despite them. If a deal seems too good

Mumbai News: Man Arrested In ₹67 Lakh Cyber Fraud Targeting Elderly Sisters; Hunt on for Mastermind

Cyber Fraud

Mumbai Police arrested Mohit Bhojraj in a ₹67 lakh cyber fraud case targeting two elderly sisters, with the mastermind Salid Mohammed Shaikh still at large. The victims were lured through a fake investment scheme on WhatsApp, promising high returns. A man from Dahisar has been taken into custody by the Mumbai Police’s South Cyber Cell about a ₹67 lakh cyber scam involving two elderly sisters. Mohit Akash Bhojraj has been recognised as the offender who was apprehended. Officials claim that Mohit maintained continuous communication with Salid Mohammed Shaikh, a well-known cyber fraudster who lives in Bengaluru, Karnataka, and is currently a sought-after suspect in the investigation. According to investigations, Mohit gave Shaikh access to 19 bank accounts, which were purportedly used to embezzle the stolen money. The cyber cell’s investigation to find the fugitive mastermind and follow the cash trail is still ongoing. The complaint claims that after investing in a financing company, the victims, two sisters living in Girgaon with their mother, were joined to a WhatsApp group in January 2025. A lady named Shruti Baheti ran the organisation and frequently shared information about profitable investment possibilities. Shruti posted conversation logs and screenshots purporting to show off earnings from prior investments in an attempt to win members’ trust. With the promise of large returns, Shruti persuaded one of the sisters to participate in a “block share deal” via direct messaging on January 21. The woman made a sizable investment after opening an account with the finance company. Following the first profits, her sister joined the organisation and invested as well. The sisters contributed a total of 67.15 lakh rupees. Their investment portfolio was reported to have increased to ₹1.88 crore shortly after. However, the transaction failed when they tried to withdraw ₹50 lakh. When asked, Shruti stated that before the money could be released, a tax payment was necessary. The sisters realized they had been duped at that point and filed a formal complaint. Mohit Bhojraj has been taken into custody by the cyber cell, which is also actively pursuing the other defendants, including the mastermind Salid Mohammed Shaikh. Investigations are still under progress.

Microsoft wants AI ‘agents’ to work together and retain information

Microsoft

Microsoft envisions AI agents collaborating across companies and improving memory retention using structured retrieval augmentation. At its Build conference, it plans to promote open standards like the Model Context Protocol to foster an interconnected “agentic web.” Microsoft’s top technologist said Sunday, ahead of the company’s annual software development conference, that the company envisions a future when its AI agents may work together with agents from other companies and remember past contacts more clearly. At its Build conference in Seattle on May 19, analysts expect Microsoft to unveil its latest tools for developers building AI systems. Microsoft is dedicated to encouraging the adoption of industry-wide standards that will allow agents from different manufacturers to collaborate, Chief Technology Officer Kevin Scott told reporters and analysts at the company’s Redmond, Washington, headquarters before to the conference.  Agents are AI systems that are able to do specific activities, like fixing a software defect, on their own. Scott claims that Microsoft is backing the open-source Model Context Protocol (MCP) technology, which was first introduced by Google-backed Anthropic. According to Scott, MCP could lead to the development of an “agentic web” in a manner akin to how hypertext protocols facilitated the internet’s growth in the 1990s. “It means that your imagination gets to drive what the agentic web becomes, not just a handful of companies that happen to see some of these problems first,” Scott stated. According to Scott, Microsoft is working to improve AI agents’ recall of tasks that customers have requested of them, but as of right now, “most of what we’re building feels very transactional.” However, because it requires more computing power, enhancing an AI agent’s memory is costly.  Microsoft is focusing on a new approach called structured retrieval augmentation, where an agent provides a roadmap of the subjects discussed by summarising each turn in a user discussion. “This is a core part of how you train a biological brain – you don’t brute force everything in your head every time you need to solve a particular problem,” Scott stated.

CLAT Counselling 2025: NLIU Bhopal adds a BSc LLB Cyber Security Hons program to the seat matrix

CLAT Counselling 2025

CLAT Counselling 2025: NLIU Bhopal has introduced a new BSc LLB (Hons) in Cyber Security program in the CLAT 2025 seat matrix, open only to science stream students. CLAT 2025 counselling registration began on May 17 and will continue until May 21 at 5 PM. CLAT Counselling 2025: The National Law Institute University (NLIU), Bhopal’s seat matrix has been revised, according to the Consortium of National Law Universities (CNLU). According to the announcement, NLIU has added a new program to its list of courses offered through the Common Law Admission Test (CLAT) 2025: BSc LLB (Honours) in Cyber Security. Additionally, the updated CLAT UG 2025 results were released. The consortium advised candidates who wish to apply for the recently introduced program to include it on their list of preferences when they go through the CLAT UG 2025 counselling procedure. Notably, only applicants who took the science stream in their 12th grade are eligible for this course. The NLIU, Bhopal brochure, which is accessible on the Consortium’s official website, has also been recommended to candidates. The authorities have made it clear that after the deadline, requests for preference adjustments will not be considered. Candidates can email the helpdesk at clat@consortiumofnlus.ac.in or phone 08047162020 between 10:00 am and 5:00 pm on all working days if they have any questions or need any assistance. The new seat matrix for CLAT UG applicants is shown below: Vertical Reservation B.A.LL.B. B.Sc.LL.B. All India General/Unreserved 52 26 All India EWS 12 6 All India SC 16 8 All India ST 20 10 All India OBC 14 7 Horizontal Reservation General/Unreserved of MP 26 13 SC of MP 8 4 ST of MP 10 5 OBC of MP 7 4 Women 30 15 All India PWD 5 3 NRI/NRI Sponsored 18 9 J & K Resident 2 2 Here is the revised CLAT PG seat matrix: Vertical Reservation LL.M All India General/Unreserved 30 All India SC 10 All India ST 12 All India OBC 8 Horizontal Reservation 15 SC of MP 5 ST of MP 6 OBC of MP 4 Women 18 All India PWD 3 The CLAT 2025 results were revealed by the Consortium in the meantime, and admissions counselling registration opened on 17 May at 4 PM. Until 21 May at 5 PM, candidates can still finish the registration procedure by logging into their official accounts.

LinkedIn co-founder claims AI should be taught at colleges, and 30% of South Korean schools utilise AI-powered textbooks

LinkedIn co-founder

LinkedIn co-founder claims AI should be taught at colleges, Nearly 30% of South Korean schools have adopted AI-powered textbooks, showcasing a national push toward digital education. LinkedIn co-founder Reid Hoffman urges colleges to integrate AI into curricula and assessments to stay relevant in evolving educational landscapes. According to reports, South Korea is implementing AI in regular classrooms as part of its aggressive efforts to transform traditional education. Nearly 30% of South Korean schools, ranging from elementary to high school, have already implemented AI-powered digital textbooks since March, according to Nikkei Asia, marking a significant shift in the way that pupils learn. This week’s APEC education ministers’ summit, which was held in South Korea for the first time in nine years, featured the proposal. Using the platform, the nation showcased its digital transformation in schools, especially the introduction of AI-based math and English textbooks for specific grade levels nationwide. Andeok Elementary School in Jeju, which was selected by the government last year as a model for digital-first learning, provided a preview of this change. In a fourth-grade arithmetic session, kids worked through problems on tablets while their scribbled solutions were shown in real time on a digital board. A clear image of how AI is being utilised to make lessons more interactive and responsive was provided by the class, which was attended by international dignitaries. Nevertheless, there have been challenges associated with South Korea’s quick adoption. Among the urgent issues the nation must confront are regional disparities in digital access and the requirement to upskill educators. A analogous debate is developing in higher education around the world as South Korea concentrates on integrating AI in early education. Reid Hoffman, a co-founder of LinkedIn, brought up an issue that many educators are now starting to address: AI is here to stay, and colleges must change. In an interview on his podcast “Possible,” Hoffman stated that as more students use generative AI tools to finish their projects, the conventional format of college exams—particularly essays—is no longer dependable. He thinks universities should reconsider how learning is evaluated and think about incorporating AI into the evaluation process itself rather than opposing it. Hoffman proposed that AI might be used as a co-examiner in future exams or that they might even shift more toward oral exams, which need a deeper level of comprehension. He pointed out that while AI-generated essays are frequently generic, teachers could use them as models for students to follow, encouraging them to set greater goals. Avoiding AI in the classroom, he added, just postpones the inevitable. You can’t “ignore the new tool,” Hoffman said, adding that giving kids the skills they need to collaborate with AI will be essential to their future employment. He cautioned that unless they aggressively embrace change, many colleges risk slipping behind as they continue to use antiquated teaching techniques.

“Informing Customers” claims that Dior’s client data was stolen in a cyberattack

Dior

Dior confirmed a cyberattack compromised client data, excluding financial details, and is notifying affected customers. This follows a wave of cyberattacks targeting major European retailers, including Marks and Spencer and Harrods. Dior stated that no financial data, including bank card details, was on the database accessed, but it did not specify the number of clients implicated. On May 14, 2025, the French luxury brand Dior declare that client data had been taken by cyber criminals, but they assured that no financial information was compromised. A number of well-known European retailers have been the victim of cyberattacks, with the major LVMH subsidiary being the most recent. Following the announcement by the Le Monde newspaper that Asian clientele had informed them of the alleged January information breach, Dior issued a statement. “The House of Dior has learned that some of our client data was accessed by an unauthorised third party. “We took immediate action to contain this incident,” the statement read. Dior stated that no financial data, including bank card details, was on the database accessed, but it did not specify the number of clients implicated. “Dior teams are still looking into and responding to this situation with the help of top cybersecurity specialists. All pertinent regulatory bodies are being notified,” it continued. “We are in the process of informing customers affected by this incident.” Le Monde claims that client names, email addresses, postal addresses, and phone numbers were among the stolen data. According to HSBC bank, Dior, one of LVMH’s two main brands along with Louis Vuitton, generated 8.7 billion euros ($9.7 billion) in revenue in 2024. Cyber gangs have been increasingly targeting new high-end brands and retailers in recent months. British company Marks and Spencer announced on May 13, 2025, that weeks of interruptions to its online services had resulted from a cyberattack that had exposed some of its customers’ personal information. The high-end department store Harrods and the Co-op food chain have also been affected in recent weeks.

Chandigarh Launches Cyber Wellness Clinic to Combat Rising Cybercrime

Chandigarh

Chandigarh’s NITTR has launched the Cop Connect Cyber Wellness Clinic to combat rising cybercrime, offering training and awareness programs, and support for citizens and law enforcement. Backed by Zscaler and ISAC, the clinic aims to build a safer digital future through education and prevention. May 12: The National Institute of Technical Teachers Training and Research (NITTR) in Sector 26 opened the Cop Connect Cyber Wellness Clinic on April 30, 2025, in a significant effort to shield Chandigarh from the growing threat of cybercrime. A vital resource for citizens, educators, students, and law enforcement in the battle against online threats like phishing, identity theft, and QR code scams, this state-of-the-art facility is supported by Zscaler’s Corporate Social Responsibility (CSR) initiative and in partnership with the Information Sharing and Analysis Centre (ISAC). NITTR Chandigarh, a pillar of technical education, was founded in 1967 under the Ministry of Education with an initial emphasis on polytechnic training throughout northern India. It is now a renowned university with programs in engineering, technology, and educational management, as well as international partnerships and a reputation as a centre for research. The Cop Connect Cyber Wellness Clinic strengthens NITTR’s dedication to digital safety after a similar project at Punjab University on March 4, 2025, proved successful. The core of this effort is Zscaler, a pioneer in worldwide cloud security that Jay Chaudhry launched in 2007. Millions are protected by Zscaler’s Zero Trust Exchange platform, which has offices in Bangalore, Hyderabad, Mumbai, Mohali, and Pune in addition to seven data centres in India. Its Social Impact Program empowers marginalised areas by advancing digital equity and cyber education. “Building a secure digital future for everyone is the goal of our collaboration with NITTR and ISAC,” Karishma Bhuyan, CSR Lead at Zscaler, stated during the launch. India is the #1 target for AI-powered cyberattacks in Asia Pacific, according to the Zscaler ThreatLabz Phishing Report 2025. Cybercriminals never stop, from hidden links in images to phoney QR code schemes. Chilling local trends were given by Chandigarh Cyber Cell SP Smt. Geetanjali Khandelwal: “Scammers are targeting expectant fathers with fake semen donation schemes, tricking them into scanning malicious QR codes.” Senior persons are identified as the primary focus of Chandigarh Police’s cyber vans and surveys conducted with NCC cadets, underscoring the critical need for awareness. A comprehensive resource for preventing common cybercrimes is the Cop Connect Cyber Wellness Clinic. It offers 26 ISAC-certified programs, practical training at ISAC’s Cyberagent Cybersecurity Labs, and awareness sessions on fraud and cyber threats. In order to develop their abilities for cybersecurity careers—an area that is expected to need millions of workers in the years to come, according to Cyber Crime Magazine—participants can use technologies like Breach Point, EthixFirst, and the National Security Database. The clinic also provides officers with specialised training in cybercrime investigation, which improves law enforcement’s capacity to react. The clinic’s technical rigor is guaranteed by ISAC, a non-profit organization that works with the Ministry of Education, Ministry of Defence, AICTE, CERT-In, and IIT Gandhinagar. Its platforms offer useful resources, including as ethical frameworks and bug bounty schemes. “This initiative empowers communities to face digital challenges head-on,” ISAC Group Captain P. Anand Naidu stated. The clinic is open Monday through Saturday from 9 AM to 5 PM and is available to victims of cybercrime and anybody seeking advice on digital safety. Additionally, it provides law enforcement with cutting-edge training in cybercrime investigation. Need assistance right away? For prompt assistance, you can get in touch with Cybercrime Intervention Officers immediately through the free ISAC Cop Connect App. With 3.5 million cybersecurity professionals needed and Cyber Crime Magazine projecting that global cybercrime expenses will reach $10.5 trillion yearly by 2025, this program positions Chandigarh as a leader in creating a safe online environment. This partnership between Zscaler, ISAC, and NITTR is revolutionary. Join Chandigarh in the fight for a safe digital future by visiting the Cop Connect Cyber Wellness Clinic and arming yourself with knowledge. Don’t hesitate—remain vigilant and secure!

Pakistan-Backed Hackers Launch 15 Lakh Cyberattacks on India; Only 150 Succeed

Pakistan-Backed Hackers

Pakistan-backed hacker groups launched over 15 lakh cyberattacks on Indian infrastructure, with only 150 being successful, according to Maharashtra Cyber. The attacks, linked to Pakistan, Bangladesh, and the Middle East, also involved disinformation campaigns and website vandalism. Mumbai: In the wake of the Pahalgam terror attack, Maharashtra Cyber has identified seven Advanced Persistent Threat (APT) organisations that carried out more than 15 lakh attacks against vital infrastructure websites throughout India. Officials said only 150 of these strikes were successful on 12 May 2025. They claimed that despite an agreement between India and Pakistan to halt military conflict, the neighbouring nation, Bangladesh, and the Middle East continue to launch cyberattacks against Indian government websites. Speaking to reporters, a top Maharashtra Cyber official refuted allegations that hackers had targeted the Election Commission website, compromised aviation and municipal systems, and stolen data from Mumbai’s Chhatrapati Shivaji Maharaja International Airport. The investigation found that, although they did not completely halt, cyberattacks on Indian government websites declined as India-Pakistan tensions subsided. Pakistan, Bangladesh, Indonesia, Morocco, and other Middle Eastern nations are still launching these attacks,” he claimed. The state’s nodal cyber agency described the cyberwarfare carried out by hacker organisations affiliated with Pakistan in a paper titled “Road of Sindoor,” which was created as part of the military campaign against terrorists that the Indian armed forces launched under the same name. All of the major law enforcement organizations, including the State Intelligence Department and the Director General of Police, have received the report. The Middle East, Bangladesh, Pakistan, and an Indonesian organization were the sources of these cyberattacks, according to the assessment, stated Yashasvi Yadav, Additional Director General of Police, Maharashtra Cyber. The techniques employed included GPS spoofing, Distributed Denial-of-Service (DDoS) attacks, and malware campaigns. There have also been reports of Indian websites being vandalised. According to him, India’s vital infrastructure was spared, and other such attempts were stopped. Maharashtra Cyber’s previous report, “Echoes of Pahalgam,” which detailed cyberattacks in the wake of the Pahalgam terror incident, is followed up on by “Road of Sindoor.” APT 36 (headquartered in Pakistan), Pakistan Cyber Force, Team Insane PK, Mysterious Bangladesh, Indo Hacks Sec, Cyber Group HOAX 1337, and National Cyber Crew (affiliated with Pakistan) are the seven hacker groups mentioned in the report. According to Yadav, these organisations combined carried out almost 1.5 million focused cyberattacks against Indian infrastructure. The website of the Kulgaon Badlapur Municipal Council was vandalised, one of the 150 successful attacks. Additionally, the attackers claimed to have stolen data from telecom businesses and Chhatrapati Shivaji Maharaja International Airport (CSMIA), some of which was purportedly found on the dark net. The Defence Nursing College’s Jalandhar website was also vandalised. According to the research, groups with ties to Pakistan are using a hybrid warfare strategy that involves extensive disinformation efforts. These organisations made exaggerated claims that they had compromised India’s banking system and disrupted power. More than 5,000 instances of false information and fake news on the armed disputes between India and Pakistan were found and eliminated by Maharashtra Cyber from social media. Thirty-five of the 80 particular misinformation cases that were reported for removal have already been removed, and the other forty-five are still pending. According to Yadav, these bogus narratives included allegations of satellite jamming, state-wide blackouts, cyberattacks on India’s power infrastructure, interruption of the Northern Command, and an alleged strike on a BrahMos missile storage facility. According to him, Maharashtra Cyber has advised people to check news from reliable and authentic sources and to avoid believing or disseminating false information.