Downloads: 2 | Views: 221 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article | Computer Science & Engineering | India | Volume 12 Issue 2, February 2023 | Popularity: 4.8 / 10
Cyber Warfare by Chinese hackers: The AIIMS Story
Dr. Yatu Rani, Sarthak Jain
Abstract: November 2021, some motivated Chinese hackers targeted Indian seaports. One year later, we see a similar debacle in the shape of the ?AIIMS hacking incident?. Out of the 100 servers at AIIMS - 40 physical and 60 virtual - 5 of the physical servers were allegedly infiltrated by Chinese hackers. On 23rd November, at 7 AM, several servers at AIIMS Delhi were down. Chinese or North Korean hackers were suspected to be behind this attack. All hospital services, including outpatient, in-patient, and laboratories had to be handled manually. 2 of the system analysts at AIIMS were suspended. Indian Computer Emergency Response Team (CERT-In) was invited to take measures to restore the servers back to normal. Data restoration & server cleaning was in progress & was taking time due to the volume of data & the large number of servers for hospital services. National Informatics Centre suspected that this could be a ransom ware attack. Rumour has it that the group of hackers demanded a ransom of 200cr, however, Delhi Police has denied all such claims of ransom. It was suspected that the VIP data stolen from the AIIMS database was being sold on the dark web. Security agencies probing the AIIMS cyber attack approached E&Y executives to examine if they found any vulnerability in the hospital?s system when they audited it a few months before the attack. And as if this was not enough, just after 11 days of the initial infiltration at AIIMS servers, another similar cyberattack took place at another very reputable hospital at Safdarjung, Delhi. Although not a ransom ware attack, it was a very serious hacking event due to the presence of crucial VIP data on the Safdarjung database. Although this issue was handled very well by the National agencies, this was still a major failure on the part of the medical institutions and the government authorities as there existed a critical vulnerability in a national-level healthcare organization. The data present in these databases is highly crucial - personal information about the VIPs, and the financial information of the patients; the examples are innumerable. Additionally, the servers once hacked shouldn?t have taken so long to get sanitized and restored back to normal. We, a nation in its 76th year of independence, need stronger laws against such cybercrimes and stronger compliance for all healthcare organizations. This also proves to be a crucial learning point for the rest of the national and state-level organizations to have better compliance and a strong cyber defense team.
Keywords: vulnerability, cyber attack, cyber crime, network, ransomeware
Edition: Volume 12 Issue 2, February 2023
Pages: 1106 - 1106
DOI: https://www.doi.org/10.21275/SR23217131720
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 90 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 10, October 2020
Pages: 1626 - 1628Image Noise Reduction with Autoencoder using Tensor Flow
Jai Sehgal, Dr Yojna Arora
Downloads: 160 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 6 Issue 8, August 2017
Pages: 868 - 874Study of Power Management in Adhoc Networks
Anandhi Giri, S. K. Srivatsa
Downloads: 190 | Weekly Hits: ⮙6 | Monthly Hits: ⮙6
Survey Paper, Computer Science & Engineering, India, Volume 7 Issue 1, January 2018
Pages: 81 - 84Novel Approach to Virtual Machine Migration In Cloud Computing Environment - A Survey
Priyanka H, Dr. Mary Cherian
Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015
Pages: 2246 - 2249Packet Analysis with Network Intrusion Detection System
Rashmi Hebbar, Mohan K