• News
  • Security
  • Products
  • About Seqrite
Seqrite Blog Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Government • Ransomware • Security  /  5 Data breaches on Government Institutions across the globe
12 September 2017

5 Data breaches on Government Institutions across the globe

Written by Seqrite
Seqrite
Government, Ransomware, Security
Estimated reading time: 3 minutes

No one is safe in the world of cybernetics, not even the Government organizations. Across the world, the Government organizations are a favorite target for hackers and cyber criminals. Be it for the value of the data held by the Government or the relatively lax security around the IT infrastructure of Government systems; hackers seem to be quite successful breaking into them. While most of us would expect that such attacks would be focused more on first world countries; the Government of almost every country across the globe has been a victim of a data breach. Let’s look at some of the interesting incidents.

1. Aadhar data breach (India): Indian government had launched a very ambitious social security initiative in which every individual is supposed to be uniquely identified based on his biometrics. The central authority collects the biometric (finger prints, retina scans, ) and other information of every individual and allocates an Aadhar number by which they can be authenticated while availing any social security service. One of the uses of Aadhar scheme is to credit the bank account of pensioners with their pensions directly.

In 2017, the information of 1.6 million pensioners was leaked on Jharkhand state Government’s website. The name, address, Aadhar number and bank account details of the beneficiaries of the pension scheme were revealed in the breach. In another separate incident, the information of about 35 lakh Aadhar card holders was leaked on Kerala Government’s website. This time, along with biometric and biographic details, the photographs and pension ids were also revealed.

2. Australian Government website attacks: Australian Government is also no stranger to cyber attacks. In June 2017, an Australian newspaper published a story that the details of Medicare of Australian citizens were available for purchase on the dark net since October 2016. The hacker used a vulnerability in the Government system to access the data. Nobody in the Government knew about the breach. In fact, before the breach was uncovered, some of the data was sold for a profit. In another embarrassing incident, in 2016, during a census counting, the website of Australian Bureau of Statistics was under DDoS attack. The site suffered 43-hour outage and was subsequently taken down. The Government tried to pass the buck to an IT contractor but ultimately it was held responsible. It took 30 million AUD to fix the issue.

In yet another incident in November 2014, due to a security breach at Australian immigration department, the personal details of world leaders such as David Cameron, Angela Merkel, Narendra Modi, Barack Obama and Vladimir Putin were leaked. The passport numbers, visa details and other personal information of the leaders attending G20 summit was leaked. It must have been quite an embarrassment for the Australian authorities.

Read more: Who’s hacking your network? Know more about cyber criminals

3. Bangladesh bank heist: Bangladesh Bank is the central bank of the country of Bangladesh. In 2016, this Government institution was hacked and the hackers successfully stole 81 Million USD. The hackers used bank’s SWIFT credentials to transfer money into various banks across the globe before the heist was discovered. Hackers had used a combination of social engineering and viruses to obtain employee credentials and access the bank’s network to make the transfers. Fortunately, the transfer of an 800 Million+ USD was stopped after discovery of breach.

4. Thailand tourist data breach: In March 2016, personal information of expats living in southern Thailand was leaked Information such as name, address, passport details and profession of more than 2000 expats were published on a fake site that resembled the immigration police website. The site had gone viral and much publicized before it was taken down.

5. Japan pension system: In 2015, Japan’s pension system was hacked and personal data of 1.25 million people were leaked An attachment in an email sent to an employee was infected with a virus. When the employee opened the attachment, the virus spread, collected data and sent it over the Internet to the hackers. Information such as names, address, birth date, pension Ids was successfully stolen. Luckily, the hacked systems were not connected to core financial system. The scandal caused huge political ramifications for the ruling party of Japan at the time.

These are not the only cases where the Government was the target of a cyber attack. In fact, China and Russia, the two countries that are blamed for most cyber attacks against western nations have also been constant targets of cyber attack themselves. No one, not even the strongest, with vast resources, are 100% safe in the cyber world. Precaution is the only defense.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostNew Hacking Threats: Biometric Vulnerabilities
Next Post  Discovered data breach? What’s your strategy to manage cyber at...
Seqrite
About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • BEC and Ransomware attacks unsettle businesses globally.

    BEC and Ransomware attacks increase during the pandemic

    January 22, 2021
  • Thanos Ransomware adopts hyper-weaponized RIPlace tactics — collects huge pay-offs.

    Thanos Ransomware Evading Anti-ransomware Protection With RIPlace Tactic

    November 18, 2020
  • Hackers ransack businesses by riding on the modern-day Trojan Horse.

    PonyFinal Ransomware dubbed by many as the modern-day Trojan horse.

    August 26, 2020

No Comments

Leave a Reply.Your email address will not be published.

Cancel reply

CAPTCHA Image
Refresh Image

Popular Posts

  • The Data breach inferno burning big-ticket businesses The Data breach inferno burning big-ticket businesses February 5, 2021
  • Are we prepared against risks generating from the IoT revolution? Are we prepared against risks generating from the IoT revolution? January 15, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks Pharma Sector needs to streamline its insides to avoid cyberattacks February 12, 2021

Featured Authors

  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Viraj Talikotkar
    Viraj Talikotkar

    Viraj is a Lead Technical Writer at Quick Heal Technologies. He is always on...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director and Chief Technology Officer of...

    Read more..

Latest Posts

  • Businesses now worried about the surge in COVID-19 infodemic

    Businesses now worried about the surge in COVID-19 infodemic

    February 26, 2021
  • Turn the Page: Cybersecurity Predictions for 2021 & beyond

    Turn the Page: Cybersecurity Predictions for 2021 & beyond

    February 18, 2021
  • Pharma Sector needs to streamline its insides to avoid cyberattacks

    Pharma Sector needs to streamline its insides to avoid cyberattacks

    February 12, 2021

Stay Updated!

Topics

Antivirus For Linux (10) apt (9) BYOD (9) COVID-19 (10) Cyber-attack (31) cyber-attacks (56) cyberattacks (12) Cybersecurity (279) cyber security (25) Cyber threat (29) cyber threats (44) Data (11) data breach (50) data breaches (27) data loss (28) data loss prevention (33) data protection (21) data security (13) DLP (49) Encryption (16) endpoint security (102) Enterprise security (14) EPS (9) Exploit (12) firewall (11) hackers (9) IoT (10) malware (58) malware attack (22) malware attacks (12) MDM (25) mobile device management (9) Network security (18) Patch Management (12) phishing (16) Ransomware (56) ransomware attack (29) ransomware attacks (30) ransomware protection (12) Seqrite (24) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (10)

Products

  • Endpoint Security (EPS)
  • Seqrite Encryption Manager
  • Seqrite Endpoint Security Cloud
  • Cloud Security
  • Seqrite mSuite
  • Seqrite MobiSMART
  • Unified Threat Management
  • Seqrite Secure Web Gateway
  • Antivirus for Server
  • Antivirus for Linux

Resources

  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies

About Us

  • Company Overview
  • Leadership
  • Why choose SEQRITE?
  • Awards & Certifications
  • Newsroom

Archives

  • By Date
  • By Category

© 2020 Quick Heal Technologies Ltd. (Formerly Known as Quick Heal Technologies Pvt. Ltd.) Cookie Policies Privacy Policies

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website.
By browsing this website, you agree to our cookie policy.