Hackers leak phone data of Army personnel in J&K

A hacker group has allegedly leaked data of Army personnel using the Bharti Airtel network in Jammu and Kashmir. However, the company has denied any breach in its system. The group, with the name of Red Rabbit Team, hacked some Indian websites and posted the data on the webpages of those portals The hackers shared some links of those webpages on Twitter in a comment over a tweet of cybersecurity researcher Rajshekhar Rajaharia and tagged several media organisations.

The query sent to the Indian Army did not elicit any reply but an Army official said, “We are not aware of any such information but it appears to be malicious intent of some inimical elements.”

When contacted, Bharti Airtel spokesperson denied any breach of its server. “We can confirm there is no hack or breach of any Airtel system as claimed by this group. Multiple stakeholders outside of Airtel have access to some data as per regulatory requirements. We have apprised all the relevant authorities of the matter to, therefore, investigate this and take appropriate action. This group has been in touch with our security team for over 15 months now and has made varying claims in addition to posting inaccurate data from one specific region,” the spokesperson said.

The links shared by the hacker were initially accessible with mobile number, name and address of subscribers but stopped working after sometime.

Red Rabbit Team claimed that it has access to pan-Indian data of Bharti Airtel through a shell uploaded on the company's server and will leak more data soon.

Mr. Rajaharia said that hackers had failed to show any credible evidence of possessing pan-India data of Bharti Airtel and it is also unclear on the way they got subscriber's data.

Telecom operators are required to give access to government and law enforcement agencies of subscriber data registration (SDR) portal.

Our code of editorial values

This article is closed for comments.
Please Email the Editor

Printable version | Sep 25, 2022 8:38:48 pm |