logo
Cyberattacks surge amid India-Pakistan clashes after strikes

Cyberattacks surge amid India-Pakistan clashes after strikes

Techday NZ14-05-2025

Cyberattacks by hacktivist groups have escalated following renewed tensions between India and Pakistan.
On May 7, 2025, India conducted "Operation Sindoor," a series of 24 missile strikes over 25 minutes against nine sites described as "terrorist infrastructure" in Pakistan and the Pakistan-administered region of Kashmir. According to Indian authorities, this operation was a response to the mass killing of 26 Indian tourists in Kashmir on 22 April. While India claims the strikes killed more than 70 militants and avoided civilian areas, Pakistan alleges at least 26 civilian casualties, has vowed to respond, and reports shooting down five Indian jets. Subsequent artillery exchanges have been reported along the Line of Control, closures of airspace have occurred, and international actors have called for restraint.
In anticipation of cyber reprisal, India moved to temporarily block overseas users from accessing the websites of the National Stock Exchange and BSE. Officials cited cyberthreat concerns as the reason for the move, affirming that trading operations remain unaffected, though access is being controlled while risks are evaluated. Indian media outlets have documented a rise in hacking claims linked to Pakistan, and Pakistan's cyber response agency, PKCERT, has warned that hostile actors are exploiting the escalation to spread disinformation and attack critical systems.
Reports compiled by Radware indicate that India has remained a frequent target of hacktivist campaigns throughout 2025, with 26 different groups targeting 100 organisations and accounting for 256 Distributed Denial of Service (DDoS) attacks since January. Most attacks were concentrated in January, but the initial week of May has seen activity accelerate as geopolitical tensions have heightened.
According to Radware, RipperSec has been responsible for over 30% of DDoS claims against Indian targets this year, followed by AnonSec (16.8%), Keymous+ (10.2%), Sylhet Gang (9%), and Mr Hamza (4.7%). Groups such as Anonymous VNLBN, Bangladesh Civilian Force, SPIDER-X, RuskiNet, Arabian Ghosts, AnonPioneers, Rabbit Cyber Team, Red Wolf Cyber, Nation of Saviors, and several others have also made claims of responsibility. Hacktivists on both sides are employing various methods, from DDoS attacks and botnets to website defacements and data leaks, with the objective of disrupting service and undermining public confidence.
More than half of the claimed DDoS attacks have targeted governmental agencies, with other significant targets including entities in education (8.3%), finance (7.4%), manufacturing (6.5%), and telecommunications (6.5%).
Since the events of May 7, DDoS attack activity aimed at India has intensified. Radware's analysis notes a spike at 4pm UTC (9:30pm IST) with up to seven claimed attacks per hour. Threat actors involved in these attacks include AnonSec, Keymous+, Mr Hamza, Anonymous VNLBN, Arabian Hosts, Islamic Hacker Army, Sylhet Gang, Red Wolf Cyber, and the Iranian group Vulture.
In these attacks post-Operation Sindoor, more than 75% of the incidents were directed at government agencies, while the financial and telecom sectors accounted for 8.5% and 6.4% respectively, comprising the bulk of the activity observed.
"Politically, socially and religiously motivated hacktivist groups are increasingly coordinating efforts, amplifying their attacks against shared adversaries," Radware said in its latest alert. "Hacktivists are using hybrid strategies, leveraging application-layer and volumetric DDoS attacks that complicate defences."
The Radware alert continued: "Hacktivists on both sides are targeting critical infrastructure using Web DDoS attacks, botnets, data leaks, and defacements, aiming to disrupt services and erode public trust."
Recent developments show several groups, including Sylhet Gang, Mysterious Team, and Red Wolf Cyber, declaring support for Pakistan and threatening expanded attacks on Indian systems. Radware observed that since 2024, there has been a growing pattern of collaboration among groups with different ideological motivations. "As noted in the Radware 2025 Global Threat Analysis Report, 2024 was a significant turning point for hacktivist alliances, as groups driven by different political, social and religious motivations united in coordinated campaigns to target shared perceived adversaries. In 2025, this trend has gained momentum, with more hacktivists offering mutual support for each other's actions and campaigns, amplifying their messages and boosting their visibility."
The alert further stated: "In the wake of Operation Sindoor, new alliances are emerging among Southeast Asian hacktivists. Some of these alliances even extend to groups traditionally opposed to Israel, such as the Iranian hacktivist group Vulture."
The situation, as described by Radware, remains volatile. "As of now, less than 24 hours have passed since the escalation between India and Pakistan, and the situation remains highly volatile. Several prominent politically motivated groups, such as RipperSec and Mysterious Team Pakistan, have publicly pledged to take action but have not yet claimed responsibility for any attacks. Their impending involvement could significantly raise the stakes."
Hacktivist groups based in India are also expected to intensify activity, raising concerns about reciprocal cyberattacks on Pakistani infrastructure. "Simultaneously, hacktivist groups supporting India, such as Indian Cyber Force, Cryptojackers of India, Dex4o4 and Ghost Force are expected to intensify their efforts to target Pakistani organisations. This could create a dangerous cycle of retaliation, increasing the risk of further cyberattacks, potentially targeting critical infrastructure on both sides."
The tactics used by hacktivists are varied. "Hacktivists frequently deploy application-layer DDoS attacks to target specific server resources, often without generating overwhelming traffic volumes. These attacks are harder to detect and mitigate, as they imitate legitimate user interactions. Common techniques include HTTPS encrypted floods and form POSTs, which overwhelm online services and their backend systems. This can result in significant service disruptions or even complete outages, especially for critical websites like government portals, financial institutions or news outlets."
"Volumetric attacks, while generally less sophisticated, are still a common strategy employed by hacktivist groups to overwhelm network infrastructure. These attacks often involve tactics such as direct path UDP floods or reflection and amplification attacks, where the target is flooded with a massive volume of UDP packets. This consumes significant bandwidth and network resources, which can potentially bring down online services or impact connectivity."
"Given the increasing sophistication of and orchestration between hacktivist groups, hybrid DDoS attacks that combine multiple techniques can be observed. These attacks could simultaneously target network infrastructure with volumetric methods while also executing application-layer attacks. These strategies complicate detection and mitigation efforts."
Radware highlighted the accessibility of DDoS tools as a contributing factor, noting: "Many groups may use publicly available DDoS tools to conduct their attacks. RipperSec members, for example, maintain and share a tool called MegaMedusa. Built using Node.js, MegaMedusa leverages its asynchronous and non-blocking I/O capabilities to manage multiple network connections efficiently, making it suitable for orchestrating extensive DDoS campaigns. The tool is publicly accessible via GitHub, allowing users to install and operate it with minimal technical expertise. Its user-friendly installation process involves executing a few commands, making it accessible even to individuals with limited technical backgrounds. The availability of these tools makes it easier for groups with varying levels of technical expertise to launch impactful attacks."
"Hacktivist groups may also utilise botnets – networks of compromised devices, often IoT devices – to launch large-scale DDoS attacks. These botnets can be rented or created through the use of malware, enabling attackers to distribute traffic across a wide range of devices. Some hacktivist groups have evolved from politically and religiously motivated attackers to DDoS-as-a-service providers, offering these services either for a fee or in exchange for advertising on their Telegram channels."
"Some hacktivists may also engage in website defacements and claim responsibility for data leaks as part of their strategy to create chaos and erode public trust in institutions. These actions are often intended to undermine the credibility of targeted organisations and spread ideological messages."

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Dozens of inmates escape Pakistani jail after earthquakes
Dozens of inmates escape Pakistani jail after earthquakes

RNZ News

timea day ago

  • RNZ News

Dozens of inmates escape Pakistani jail after earthquakes

Several earthquakes caused panic among the prisoners. File photo Photo: Flickr / David Zoppo Dozens of prisoners escaped from a jail in the Pakistan city of Karachi late on Monday night, a provincial law minister said. The jail break occurred after several earthquakes caused panic among the prisoners, the minister, Zia-ul-Hasan Lanjar, told reporters outside Malir prison. His comments were carried live on local TV news channels on Tuesday. Lanjar said 46 of the escapees had been captured but he did not say how many prisoners had escaped. The prison break was one of the largest ever in Pakistan, he said. - Reuters

Pakistan to play in Colombo when India hosts women's World Cup
Pakistan to play in Colombo when India hosts women's World Cup

RNZ News

time2 days ago

  • RNZ News

Pakistan to play in Colombo when India hosts women's World Cup

Fatima Sana of Pakistan and Aliya Riaz of Pakistan in New Zealand in 2023. Photo: John Davidson/ Pakistan will play all their women's 50-over World Cup matches in Sri Lanka's capital Colombo when India hosts this year's tournament, the International Cricket Council said on Monday. Politically-estranged India and Pakistan, who have not played a bilateral series since 2013, will play their matches in neutral venues when either country hosts an ICC event, the sport's global governing body announced in December. "The venues for the knockouts are dependent on Pakistan qualifying as two alternative venues have been identified for one semi-final and the final," the ICC said. "Colombo will be the venue for the first semi-final and the final only if Pakistan qualify for those stages." Bengaluru, where the tournament will start with India playing in the opening match, will host the final on November 2 if Pakistan are knocked out earlier in the tournament, the ICC added. Bengaluru will also stage the second semi-final on October 30, a day after the first semi-final in Colombo or Guwahati. Visakhapatnam and Indore are the two other host cities for the eight-team tournament. India played all their matches in Dubai when Pakistan hosted the men's Champions Trophy this year, including the final which they won. Both the Indian Premier League and the Pakistan Super League were suspended last month amid clashes between the two countries following an attack targeting tourists that killed 26 people in Kashmir in April. Matches resumed after a ceasefire was announced. The neutral venue arrangement between the countries will also be in place for the men's T20 World Cup in 2026, which India will co-host with Sri Lanka, and the women's T20 World Cup in 2028 in Pakistan. - Reuters

Defend The Adivasis Of Central India. Ceasefire And Peace Talks Now
Defend The Adivasis Of Central India. Ceasefire And Peace Talks Now

Scoop

time4 days ago

  • Scoop

Defend The Adivasis Of Central India. Ceasefire And Peace Talks Now

It is not just Palestine that is under siege. Central India is also embroiled in an all-out-war that is killing the Indigenous Adivasi people. Like Israel, the Indian state has also committed countless harrowing violations to the international humanitarian law – but toward its own people, in order to seize the mineral-rich land of the region for its neoliberal agenda. To open Central India to foreign investments and corporate plunder, the government launched its military campaign against Naxals (Maoist rebels). However, this campaign has mainly targeted the civilian Adivasi communities and their advocates. Recently, the government intensified its attacks through routine harassment, extrajudicial killings, mass sexual violence, illegal arrests and detention in security camps, and aerial bombings, especially in the region of Bastar, Chhattisgarh and the Karegatta Hills, Telangana. Many of the state-perpetrated killings are covered up as deaths from fake encounters. In Bastar alone, over 400 of these killings were reported since January 2024, which included elderly and children casualties. This year, hundreds of cases of rape, unlawful arrests of activists, and the burning of over 300 villages in Bastar have been documented. All this brutal violence is justified under the pretense of counter-insurgency, which has reinforced the land grabbing and forcible displacement of communities already legitimized by deceptive policies such as the Scheduled Tribes and Traditional Forest Dwellers (Recognition of Forest Rights) Act (FRA). The constitutional rights granted to Adivasis for self-governance are blatantly ignored and violated to favor exploitation of natural resources through the rapid expansion of infrastructure for intensive extractive industries, which in turn threaten the lives and livelihoods of the Adivasis, attack their food systems, and destroy the environment. The People's Coalition on Food Sovereignty expresses its grave concern over the situation, particularly the employment of state militarization that is pushing the Adivasi population into starvation and destitution. Moreover, we strongly condemn the violations to human rights and the international humanitarian law committed by the Indian state and its forces in the name of counter-insurgency to acquire Adivasi lands and plunder their communities' resources. We call out the India government for its war crimes, including the extrajudicial killings of Naxal combatants – even the General Secretary of the Communist Party of India (Maoist) – that have been seeking deescalation through their unilateral ceasefire declaration. We urge to heed the appeals for ceasefire and peace talks and immediately suspend the national and regional counter-insurgency programs behind Central India's militarization that are killing the Adivasis (such as Operation Kagar in Bastar and Operation Black Forest in Karegatta Hills). The root causes of armed conflict will never be addressed by the further escalation of wars and military offensives that only contribute to people's hunger and impoverishment. There would never be a need for the people to take up arms in the first place if their socio-economic demands and civil liberties – especially concerning the right to food and land – are met and pro-people development is prioritized over profit.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store