Topics
late
AI
Amazon
Image Credits:Jagmeet Singh / TechCrunch
Apps
Biotech & Health
mood
Image Credits:Jagmeet Singh / TechCrunch
Cloud Computing
Commerce
Crypto
Several search results showing compromised Indian government websites hosting scam sites.
Enterprise
EVs
Fintech
Fundraising
gadget
Gaming
Government & Policy
ironware
Layoffs
Media & Entertainment
Meta
Microsoft
privateness
Robotics
Security
societal
Space
Startups
TikTok
Transportation
Venture
More from TechCrunch
Events
Startup Battlefield
StrictlyVC
Podcasts
Videos
Partner Content
TechCrunch Brand Studio
Crunchboard
Contact Us
Some Indian government websites carry on to allow the planting of scammy links on their official domains months after TechCrunchreported the issue .
TechCrunch receive more than 90 “ gov.in ” website links associated with Indian political science department — including the Indian Council of Agricultural Research and India Post , as well as state governments and council of Haryana and Maharashtra and others — were redirecting to situation join to online betting and investment scam . Search engines like Google have index the scam inter-group communication host on government site , increasing the risk of infection of regular internet users finding them .
In May , TechCrunch reported that around four twelve Indian political science internet site linkswere airt to online look platforms . India ’s cyber delegacy , the Computer Emergency Response Team , known as CERT - In , step up the matter at the meter . However , it remained indecipherable whether the authorities had make the underlying flaw that the scammers were exploiting to plant their link .
Deedy Das of Menlo Ventures , among others , postedon societal culture medium program X this week about the issue resurfacing , indicating that the hacked pages are far-flung .
protection investigator Bob Diachenko tell apart TechCrunch that the matter may have resurfaced due to a via media in the internet site ’ content direction system ( CMS ) or server constellation .
“ If only the symptoms ( e.g. , malicious subject matter ) are removed without addressing the root cause ( for example , vulnerability or back door ) , attacker can re-introduce the issue , ” Diachenko tell , add up , “ It is not a very challenging exercise but requires some downtime and efforts . ”
Earlier this week , TechCrunch get through CERT - In with a few affected tie-in . The agency did not respond to the e-mail , though the links begin show a “ page not find ” erroneous belief at around the time of issue .