In a concerning turn of events, the notorious Knight ransomware group has openly declared its involvement in the recent National Health Mission cyberattack.
This announcement came via a dark web channel commonly frequented by such threat actors. The Knight ransomware group shared this update on their own dark web channel where they added some screenshots of National Health Mission cyberattack claims.
The National Health Mission, an important initiative launched by the government of India in 2005, incorporated the National Rural Health Mission and the National Urban Health Mission. Its mandate was further extended until March 2020.
As an integral part of the Department of Health & Family Welfare under the Government of Uttar Pradesh, any breach of the National Health Mission’s security would undoubtedly have significant repercussions.
The Cyber Express also reached out to the Department of Health & Family Welfare regarding the alleged National Health Mission cyberattack. However, at the time of writing this, no official statement or response has been received from the ministry. This leaves the claims of the alleged National Health Mission cyberattack stand unverified.
The National Health Mission cyberattack is just the tip of the iceberg as the Indian government faced multiple cyber intrusions from different threat actors. Just last year, there were reports of data breaches in India’s CoWIN vaccine portal.
While the head of the National Health Authority, R.S. Sharma asserted the portal’s robust security infrastructure, the data leak, exposing the sensitive information of millions, was a reminder of the vulnerabilities faced by the Indian government.
This National Health Mission cyberattack, encompassing names, Aadhaar national IDs, mobile numbers, voter IDs, passports, and COVID-19 vaccination records, marked one of India’s largest data exposures. It followed a series of other breaches involving CoWIN and Aadhaar data, as well as records from a prominent Delhi-based hospital.
CloudSEK’s Threat Research team recently revealed crucial findings about the Knight Ransomware group, formerly known as Cyclops. Emerging in May 2023, this group spent three years developing a highly versatile ransomware capable of infiltrating major platforms like Windows, Linux, macOS, ESXi, and Android.
Operated by an entity known as easy22go, this Ransomware-as-a-Service (RaaS) is promoted on online forums. Notably, it is coded in Golang. This innovative malware not only encrypts data but also enables exfiltration, revolutionizing ransomware attacks.
The group, rooted in Russia and Europe, is currently focused on perfecting the software for potential affiliates and recruiting individuals skilled in propagation techniques like phishing and social engineering.
They offer tailored versions for small-scale targets and phishing, as well as a comprehensive version for builders and stealers. Additionally, the Knight gang claims connections with other ransomware groups including Lockbit and Babuk.
Media Disclaimer: This report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users bear full responsibility for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
Aleksei Volkov, of St. Petersburg, Russia, was sentenced for his role of access broker assisting major cybercrime groups, including the…
Critical CVE‑2026‑21992 flaw in Oracle Identity Manager allows unauthenticated remote code execution; urgent patch released to mitigate risk.
The alleged Crunchyroll data breach may have exposed user data through a third-party breach.
Dr. Sheeba Armoogum doesn't just defend networks. She defends trust. Read full interview...
The FBI outlines a structured, multi-stage malware framework that combines deception with persistence.
DNS security guidance gets a major update in NIST SP 800-81r3, covering protective DNS, encryption, DNSSEC, and infrastructure best practices.
This website uses cookies. By continuing to use this website you are giving consent to cookies being used.
Read More