Was the website of the Aviation Ministry hacked?

0

Hackers were able to take control of the Ministry of Aviation website twice in a single strike on a government website.

Details indicate that the IT staff had to temporarily restore the ministry’s website after it had been hacked and a message in a foreign language appeared.

But the hackers weren’t finished yet; they returned to the website for a second attack and were able to take advantage of weaknesses once again. Later on, the website was once again accessible to the IT staff.

The cyberattacks on the website of the Ministry of Aviation have caused grave worries over the overall cybersecurity protocols. There is yet no formal statement on the incident.

A government website has been hacked previously as well. A similar hack affected the website of the Supreme Court of Pakistan earlier this year.

Additionally, a message claiming, “Our spring sale has started,” was shown by the hackers.

Moreover, cyberattacks have been launched on Pakistan Railways’ official website several times in the past, underscoring a persistent problem with cybersecurity in government agencies.

The National Telecommunications Corporation (NTC) has provided clarification about the reports of website hacking by the Aviation Ministry. There was no breach in the Aviation Ministry’s website security, according to NTC official Faisal Imtiaz, who refuted the media allegations.

The spokesperson made it clear that there hasn’t been any hacking on the website; instead, they’ve implemented a captcha, which news outlets mistook for a breach by an international hacker organisation.

“The website employs multilayer security,” he continued. It seems that the captcha can distinguish between a human and a bot. That is the accepted security protocol. A Chinese-language captcha that read, “Your computer or network may be sending an automatic access request,” was sent to users. Please input the following letters to continue accessing

LEAVE A REPLY

Please enter your comment!
Please enter your name here