He was rewarded by IAS Officer for pen testing on government sites, which gave him huge exposure and helped them improving security. He is thus considered one of the 10 most dangerous hackers of India. Rajesh Babu is another intelligent, reliable hacker and one of the best persons to check the security of the websites in India. He is one of the top ethical hacker who has worked in government offices and agencies. He is the one who started coaching at Kerala to train ethical hackers and preparing a well-trained and knowledgeable team for cyber security.
He is the owner of own company called Mirox Technopark in Kerala. Falgun Rathod — He is actively engaged in the protection of the security systems of government organizations and has developed the theme in Social Engineering which is diverse from hacking.
Falgun is known for giving expert advice to the corporate bodies and different IT companies and is considered a great hacker. Pranav Mistry is the senior vice president of Research at Samsung and is well-known for his hacking skills that can knack anyone down. Pranav is well known for developing different types of hacking protection softwares.
His core area include ethical hacking and he is also considered as one of the most dangerous hackers in India because of his ability to crack high security systems effectively. Hackers used skimming devices to steal information from debit cardholders.
Transactions made from stolen details amounted from Rs. Data leaked included Aadhaar, PAN and mobile numbers, bank account numbers, IFSC codes and mostly every personal information of all individual cardholders.
Indian-based healthcare websites became a victim of cyber attack recently in As stated by US-based cyber security firms, hackers broke in and invaded a leading India-based healthcare website. The hacker stole 68 lakh records of patients as well as doctors. Two hackers from Navi Mumbai were arrested for transferring 4 crore rupees from numerous bank accounts in August They illegally transferred money from the bank accounts of many individuals.
They also tried to hack accounts of various targeted companies. Tactics, techniques, and procedures : Phishing attacks, credential harvesting, impersonation, website spoofing, and data exfiltration. Motive : Using phishing emails that look as though they were sent by the local authorities in charge of dispensing government-funded COVID support initiatives, the hackers try to drive recipients to fake websites where they can be tricked into divulging personal and financial information.
Stone Panda — also known as APT10, menuPass, and Cloud Hopper — is a Chinese threat actor group that has traditionally shown interest in stealing international trade data and supply chain information for big companies. Tactics, techniques, and procedures : Phishing attacks to install malware, leveraging Web and SLL based vulnerabilities, and employing tactics that use tools or features that already exist in the target environment.
Motive : The primary motive is data exfiltration. This is when hackers try to steal intellectual properties, copyrights, and trade secrets as part of corporate espionage activities to cause operational disruption and reputational damage. Pakistan's conflict with India has been ongoing, and APT36's activities are a continuity of those hostilities. Tactics, techniques, and procedures: Phishing emails that typically contained bogus health advisories on coronavirus.
He has worked in enormous industry like Reliance, Cisco and Microsoft. He is one of the best hacker who assists the students in their field. He is a very talented guy as he has found many lags in the different websites and suggested the high-level security codes for them. He is a senior vice president of Research at Samsung.
He is a scientist and inventor as he has developed many computer hacking protection software. Rahul is one of the best hacker and he has completed his education from Lovely Professional University. He has developed the module for Corporate Hacking protection. He was born in Gurdaspur, Punjab. He has completed his academic degree B. He is expert at Ethical Hacking and Network Defense development tools. Besides all these, he also gives coaching classes in Net Training, Cyber Security and other technology.
He conducts time to time workshops in ethical hacking and security development for sites. He has also written articles on Cyber Security.
0コメント