Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 13, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 13, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 13, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 13, 2025

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025

      Microsoft shares rare look at radical Windows 11 Start menu designs it explored before settling on the least interesting one of the bunch

      May 13, 2025

      NVIDIA’s new GPU driver adds DOOM: The Dark Ages support and improves DLSS in Microsoft Flight Simulator 2024

      May 13, 2025

      How to install and use Ollama to run AI LLMs on your Windows 11 PC

      May 13, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Community News: Latest PECL Releases (05.13.2025)

      May 13, 2025
      Recent

      Community News: Latest PECL Releases (05.13.2025)

      May 13, 2025

      How We Use Epic Branches. Without Breaking Our Flow.

      May 13, 2025

      I think the ergonomics of generators is growing on me.

      May 13, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025
      Recent

      This $4 Steam Deck game includes the most-played classics from my childhood — and it will save you paper

      May 13, 2025

      Microsoft shares rare look at radical Windows 11 Start menu designs it explored before settling on the least interesting one of the bunch

      May 13, 2025

      NVIDIA’s new GPU driver adds DOOM: The Dark Ages support and improves DLSS in Microsoft Flight Simulator 2024

      May 13, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»VIT Bhopal Hacker Lied? Indian University Says Attacker Did So to Gain Attention

    VIT Bhopal Hacker Lied? Indian University Says Attacker Did So to Gain Attention

    July 2, 2024

    Did a threat actor lie about orchestrating a data breach containing sensitive data about 8,000 students and faculty of a university in India? VIT Bhopal, the university in question, says so and has shared proof with The Cyber Express debunking the hacker’s claims. The university also felt that the hacker’s failed attempt to carry out a cyberattack was only to “garner attention and notoriety.”

    What Was VIT Bhopal Data Breach Claim?

    VIT Bhopal was established in 2017 and is a deemed university located on the outskirts of Bhopal, the capital city of the state of Madhya Pradesh. The institution is authorized by the University Grants Commission (UGC), which is a statutory organization of the Government of India for the maintenance of standards of teaching, examination, and research in university education.

    VIT Bhopal ranks among the top universities in India. As per the National Institutional Ranking Framework (NIRF) Ranking, it stands in 65th position amongst all the universities in India.

    On June 10, 2024, a threat actor, operating under the name “lucifer001,” claimed on the notorious data breach site BreachForums that they had carried out a cyberattack on the university’s website.

    Source: X

    According to the post, the threat actor shared screenshots and claimed to possess the following information:

    ID: Unique Identification number assigned to each student and faculty member of the university.
    Username: Login credentials of all the stakeholders used to access university portals, maintain and share records, post newsletters, and research materials confined to the institution.
    Full name: First and last name of the students and faculty of VIT Bhopal.
    Email: Email addresses of stakeholders, which is the official mode of communication for announcements, course materials and student-faculty interactions.
    Password: To access personal accounts and university resources.
    User Activation Key: A unique code allegedly required for initial account activation or password resets.

    VIT Bhopal Refutes Data Breach Claim

    The university responded to the data breach claims and said that the information shared by the cyberattacker was to “gain attention and notoriety through dubious and illegal methods.”

    Sharing a point-by-point explanation debunking the claims, Dr G Vishnuvarthanan, Assistant Director, Centre for Technical Support, VIT Bhopal University, said, “I would like to provide some invaluable findings and suggestions from our end, which need to be treated as a rebuttal.”

    After an internal investigation, the university found that the hacker only “leaked insignificant” info from a dummy Application Programming Interface (API), which was not protected.

    “It is crucial to clarify that the alleged breach involved a dummy API endpoint, intentionally open for various third-party integrations with the university’s website. This endpoint contains only dummy data, designed explicitly for testing and integration purposes, and does not include any real or sensitive information,” Vishnuvarthanan explained.

    He then went on to clarify that in its investigation of the data breach claim, the university found that the hacker accessed only eight rows of dummy data, which contained nothing of significance.

    “VIT Bhopal University takes data security very seriously. Upon learning of the alleged breach, the university immediately conducted a thorough review and investigation. Despite our confidence in our security measures, we verified that only 8 rows of dummy data from the dummy API were accessed. This data has no significance and was part of the publicly available integration tools,” he added.

    The University stated that it follows industry-standard data security practices and tools to ensure the safety of student and faculty data.

    He ascertained the university’s commitment to data security based on four core practices:

    Regular Security Audits: Conducting periodic security audits to identify and address potential vulnerabilities.
    Advanced Encryption: Utilizing advanced encryption techniques to protect data at rest and in transit.
    Access Controls: Implementing strict access controls to ensure that only authorized personnel can access sensitive information.
    Incident Response Plan: Maintaining a comprehensive incident response plan to swiftly address any security incidents.

    Cyber Attack Threat: A Challenge to Digital Assets

    While the VIT Bhopal data breach claim turned out to be a hoax, cyber threats around the globe is a matter of concern, and are continuing to evolve in sophistication and scale. It is not just organizations but consumers too who face an ever-growing challenge to safeguard their digital assets.

    To brace this challenge, Cyble, a leading force in AI-based cybersecurity, recently unveiled AmIBreached 3.0, its dark web engine.

    What is AmIBreached?

    AmIBreached 3.0, developed by Cyble offers advanced tools to identify, prioritize, and mitigate dark web risks. This comprehensive platform accesses over 150 billion records from breaches, hacking forums, and discussions, providing organizations with critical insights into hidden threats. With real-time monitoring and actionable intelligence, AmIBreached 3.0 helps organizations and individuals proactively address and manage emerging cyber threats efficiently.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLockBit 3.0 Hits Croatia’s hospital KBC Zagreb, Indonesia’s Tin Manufacturer PT Latinusa
    Next Article ‘We Refused to Pay,’ Evolve Bank Says as LockBit Leaks Data, Affirm Card Users Impacted

    Related Posts

    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20003 – Intel Graphics Driver Link Following Privilege Escalation Vulnerability

    May 13, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-20018 – Intel Graphics Driver Pointer Dereference Privilege Escalation Vulnerability

    May 13, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Rilasciato Dillo 3.2: Un Nuovo Aggiornamento per il Browser Web Open-Source in Celebrazione del 25° Anniversario

    Linux

    Fine-Tuning NVIDIA NV-Embed-v1 on Amazon Polarity Dataset Using LoRA and PEFT: A Memory-Efficient Approach with Transformers and Hugging Face

    Machine Learning

    I tested Beats’ new Pill speaker and it delivered gloriously smooth sound for any style of music

    Development

    Proton Pass vs. 1Password: Which password manager is right for you?

    News & Updates
    Hostinger

    Highlights

    How to assign an IP to a seleniumGrid

    May 10, 2024

    I need seleniumGrid to be accessible via localhost (127.0.0.1) and instead of that, it is being offered in address:port 192.168.1.39:4444
    What command option can I use to make it use localhost?
    The command I’m using, right now is:
    java -jar selenium-server-4.2.2.jar standalone
    I’m using MacOS, 12.5 (Monterey)

    Code a full stack Instagram Clone with Laravel and MongoDB

    April 2, 2025

    Exploring Prediction Targets in Masked Pre-Training for Speech Foundation Models

    March 16, 2025

    Speed­i­fy VPN ma­cOS Vulnerability Let Attackers Escalate Privilege

    April 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.