Dawnofdevil hacker group claims to steal Indian Income Tax department data

A recently identified hacking group, known as 'Dawnofdevil,' has surfaced, claiming responsibility for breaching the web portal of the Indian Income Tax Department.
This emerging group entered the hacking scene in December 2023 and gained attention after previously hacking into the servers of Hathway, an internet services provider, on December 22 of the same year, exposing data related to millions of users.
The latest development involves the release of a subset of data on a breach forum, purportedly from tax-paying users in India.
Against the backdrop of escalating cyber threats faced by India, particularly from neighboring countries in recent weeks, the disclosure of compromised data from the Income Tax Department adds to the challenges faced by the nation.
With the consecration of Lord Shri Ram in Ayodhya scheduled for January 22, 2024, the country is on high alert for various forms of threats from adversaries.
The revelation of hacked data has sent shockwaves through the Information and Broadcasting Ministry of India, considering the ongoing cybersecurity challenges.
While initial assessments indicate that the data breach might not be as severe as claimed, as the released data appears to be a duplicate of archives, the exposure of critical information exceeding 400GB, including names, addresses, PAN card details, Aadhaar numbers, IP addresses, KYC documents, contact details, email addresses, and password hashes, raises concerns about the potential for identity theft.
In a recent announcement on a Telegram channel dated January 16, 2024, DawnofDevil hinted at possessing millions of records from a government agency responsible for maintaining electoral rolls for verification and de-duplication purposes.
This revelation implies that the hacking group could pose a serious and imminent threat to both public and private organizations in India in the coming weeks.
The situation demands heightened vigilance and proactive measures to address the cybersecurity challenges facing the nation.


This Cyber News was published on www.cybersecurity-insiders.com. Publication date: Tue, 16 Jan 2024 16:13:04 +0000


Cyber News related to Dawnofdevil hacker group claims to steal Indian Income Tax department data

Dawnofdevil hacker group claims to steal Indian Income Tax department data - A recently identified hacking group, known as 'Dawnofdevil,' has surfaced, claiming responsibility for breaching the web portal of the Indian Income Tax Department. This emerging group entered the hacking scene in December 2023 and gained attention ...
1 year ago Cybersecurity-insiders.com
How to perform a proof of concept for automated discovery using Amazon Macie | AWS Security Blog - After reviewing the managed data identifiers provided by Macie and creating the custom data identifiers needed for your POC, it’s time to stage data sets that will help demonstrate the capabilities of these identifiers and better understand how ...
4 months ago Aws.amazon.com
Tax Season Alert: Common scams and cracked software - OpenText is committed to providing you with the latest intelligence and tips to safeguard your digital life, especially during high-risk periods like tax season. Our threat analysts are constantly monitor the ebb and flow of various threats. One ...
11 months ago Webroot.com
Amazon Wins $274m Tax Battle With EU - Defeat for European Commission after court rules Amazon does not have to pay 250m euros in back taxes to Luxembourg. The European Commission and EU antitrust chief Margrethe Vestager have been handed a defeat in their attempts to crack down on ...
1 year ago Silicon.co.uk
Hijacking Your Bandwidth How Proxyware Apps Open You Up to Risk - Is this true? To examine and understand the kind of risks a potential user might be exposed to by joining such programs, we recorded and analyzed network traffic from a large number of exit nodes of several different network bandwidth sharing ...
1 year ago Trendmicro.com
Latest Information Security and Hacking Incidents - In the ongoing battle to secure the cyber realm, the emergence of new hackers continues unabated, constantly innovating methods to breach the digital boundaries that safeguard your online world. This group, operating discreetly within the confines of ...
1 year ago Cysecurity.news
How an Indian startup hacked the world - Reuters previously named Appin in a story about Indian cyber mercenaries published last year. This report paints the clearest picture yet of how Appin operated, detailing the world-spanning extent of its business, and international law enforcement's ...
1 year ago Reuters.com
EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group - For the last several months, there has emerged a campaign of bullying and censorship seeking to wipe out stories about the mercenary hacking campaigns of a less well-known company, Appin Technology, in general, and the company's cofounder, Rajat ...
11 months ago Eff.org
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
4 months ago Securelist.com
Hacker Conversations: Chris Evans, Hacker and CISO - Chris Evans is CISO and chief hacking officer at HackerOne. SecurityWeek's Hacker Conversations series seeks to understand the mind and motivations of hackers by talking to hackers. Evans challenges the common perception of both hackers and their ...
7 months ago Securityweek.com
Hacker 'ShinyHunters' Pleads Not Guilty in Cybercrime Case - A hacker known as 'ShinyHunters' has pleaded not guilty in a case of cybercrime. The hacker is accused of taking part in illegal activities to steal data from victims, including passwords, credit card information, and other personal details. The ...
2 years ago Blog.cloudflare.com
Data De-Identification: Balancing Privacy, Efficacy & Cybersecurity - COMMENTARY. Global data privacy laws were created to address growing consumer concerns about individual privacy. These laws include several best practices for businesses about storing and using consumers' personal data so that the exposure of ...
1 year ago Darkreading.com
SideCopy Exploiting WinRAR Flaw in Attacks Targeting Indian Government Entities - The Pakistan-linked threat actor known as SideCopy has been observed leveraging the recent WinRAR security vulnerability in its attacks targeting Indian government entities to deliver various remote access trojans such as AllaKore RAT, Ares RAT, and ...
1 year ago Thehackernews.com
GM Sues San Francisco Over $108m Tax Bill - Parent company of robotaxi firm Cruise, General Motors, files lawsuit against San Francisco over $108m tax bill. General Motors has filed a lawsuit against the city of San Francisco, in a tax dispute centred around its Cruise self-driving division. ...
1 year ago Silicon.co.uk
Change Healthcare's New Ransomware Nightmare Goes From Bad to Worse - Change Healthcare is facing a new cybersecurity nightmare after a ransomware group began selling what it claims is Americans' sensitive medical and financial records stolen from the health care giant. RansomHub claimed it had health care data on ...
9 months ago Wired.com
'Defunct' DOJ ransomware task force raises questions, concerns | TechTarget - "The Office of the Deputy Attorney General (ODAG) memorandum that established the Ransomware Task Force also contained several strategic areas, including directing the Ransomware Task Force to design and implement a strategy to disrupt and dismantle ...
4 months ago Techtarget.com
Indian IT Leaders Identify Security Gap in Data Policies - A recent study by Rubrik, a US-based data security firm, has bare concerning reality within the Indian IT sector: an alarming 49% of IT leaders feel that security remains a glaring omission within their organization's data policies. This discovery ...
1 year ago Securityboulevard.com
Hacking Protected Java-Based Programs - This article provides examples of hacking techniques that can help Java developers avoid vulnerabilities in their programs. It is not intended to train hackers but rather for naive developers who think that standard obfuscators will save them from ...
1 year ago Feeds.dzone.com
North Korean Hackers Attacked Indian Medical and Energy Companies - The North Korean military's notorious hacking arm, known as the Lazarus Group, has been accused of targeting public and private sector research organizations, an Indian medical research company, and other businesses in the energy sector. Security ...
2 years ago Therecord.media
Tech Security Year in Review - In this Tech Security Year in Review for 2023, let's look into the top data breaches of the past year. Each factor contributes to the growing threatscape, demanding a proactive and adaptable cybersecurity approach to safeguard your organization ...
1 year ago Securityboulevard.com
Ransomware Groups Gain Clout With False Attack Claims - The cybersecurity community is getting duped by fake breach claims from ransomware groups, experts say - and ransomware misinformation is a threat they predict will only grow in the coming months. The cybersecurity community should know that ...
1 year ago Darkreading.com
ID Theft Service Resold Access to USInfoSearch Data - One of the cybercrime underground's more active sellers of Social Security numbers, background and credit reports has been pulling data from hacked accounts at the U.S. consumer data broker USinfoSearch, KrebsOnSecurity has learned. Since at least ...
1 year ago Krebsonsecurity.com
security and privacy in Facebook groups - Having found myself roped into assisting as co-administrator a couple of Facebook groups with security/privacy issues, I thought I should, perhaps, share what little I know about defending your group against scam and spam posts and comments by ...
1 year ago Securityboulevard.com
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
10 months ago Securityweek.com
St. Lucie County Tax Collector Hacked by Ransomware Attacker 'Dark Cat' - Fort Pierce - Thursday November 16, 2023: A ransomware attack on the St. Lucie County Tax Collector was the initial cause of the network crash that has disrupted county internet services for the past two weeks. Tax Collector Chris Craft says no ...
1 year ago Wqcs.org

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)