• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
is this the end of the road for ransomware?

Cyber attackers strike flood monitoring system in Goa, India

You are here: Home / General Cyber Security News / Cyber attackers strike flood monitoring system in Goa, India
July 13, 2022

Shutterstock

Cyber attackers have focused a flood monitoring process with ransomware in Goa, India, demanding Bitcoin in return for decrypting the information.

The Water Source Office (WRD) operates a flood checking technique at 15 destinations on Goa’s key rivers, created to observe h2o ranges as portion of its disaster administration setting up.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


On the other hand, WRD government engineer Sunil Karmarkar stated the procedure was struck by a ransomware attack on June 21, taking location concerning 12am and 2am.

As a final result, integrity of the system’s information was altered, avoiding the capacity to back up the past knowledge. In accordance to Karmarkar, the server operates on a 24-7 internet line and an absence of antivirus protection and use of out-of-date firewalls served facilitate the ransomware attack.

“The server has been less than cyberattack of ransomware,” Karmarkar stated in a report to authorities. “Under the attack, all the data files are encrypted with eking extension and cannot be accessed.

“In a popup and saved file, the attackers are demanding Bitcoin cryptocurrency for the decryption of the info.”

In the aftermath, the flood checking system’s info could not be accessed or downloaded from the server, like data connected to battery voltages of various stations.

Additionally, details packets relating to 12 of the flood system’s stations could not be transferred to the WIMS server, text messages and e-mails had been unable to be received, and old facts could not be backed up, Karmarkar added.

Police claimed they have requested associates of Hyderabad-primarily based computer software developer ASTRA Microwave Products getting asked to aid observe down the culprits and superior defend the flood checking method.

“This get the job done has been awarded to ASTRA Microwave Goods Ltd, Hyderabad,” Karmarkar disclosed. “The enterprise has been directed to block further more damage and up grade the program and recuperate the data at their have risk and cost.”

The attack is the newest case in point of cyber criminals that will attack any organisation and method with ransomware, regardless of its result on persons and society. Even though some groups this kind of as Lockbit will veer away from concentrating on organizations this sort of as hospitals and utilities, other people – this kind of as the notorious Conti ransomware attackers – are indiscriminate and will not acquire morals into thing to consider.

In the wake of the attack, well known cybersecurity professional Kevin Beaumont took to social media to condemn the cyber criminals for targeting a critical basic safety program. He mentioned on Twitter: “Whichever ransomware team did this ought to present a absolutely free decryption vital.”


Some components of this post are sourced from:
www.itpro.co.uk

Previous Post: «researchers uncover new variants of the chromeloader browser hijacking malware Researchers Uncover New Variants of the ChromeLoader Browser Hijacking Malware
Next Post: FTC fires warning against sensitive data misuse ftc fires warning against sensitive data misuse»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.