Menu
Threat Intelligence

Flash Report: Rise of Hacktivism Incidents amid India-Pakistan Hostilities

by ZeroFox Intelligence
Flash Report: Rise of Hacktivism Incidents amid India-Pakistan Hostilities 
7 minute read

Key Findings

  • ZeroFox has observed an increase in hacktivist incidents targeting entities on both sides of the border during the recent escalation in hostilities between India and Pakistan. 
  • According to announcements from malicious collectives, leveraged tactics, techniques, and procedures (TTPs) include distributed-denial-of-service (DDoS), website defacement, and data breaches.
  • Hacktivist groups often conduct attacks and select targets opportunistically, and notable geopolitical events—such as a rise in state tensions or the outbreak of conventional conflict—often provide the justification necessary to target entities perceived as socially, politically, or ideologically misaligned.
  • As regional tensions continue to reduce, there is a very likely chance that hacktivism activities emanating from pro-India and pro-Pakistan collectives will reduce in intensity and tempo.

Details

ZeroFox has observed an increase in hacktivist incidents targeting entities on both sides of the border during the recent escalation in hostilities between India and Pakistan. 

Since the onset of these hostilities, various pro-Pakistan hacktivist collectives have claimed to have conducted over 100 cyberattacks targeting India-based entities; there has been an emphasis on government, education, and critical infrastructure sectors. Leveraged attack methods include DDoS attacks, website defacement, and data breaches. 

  • While hacktivism can result from perceived domestic injustices, it is very often tied to geopolitical incidents and rising state tensions, as previously observed following the onset of the 2022 Russia-Ukraine hostilities. 
  • ZeroFox has observed a higher number of hacktivist attacks targeting India-based entities than Pakistan-based ones, though the likely validity of the various collectives’ claims varies significantly.

On May 16, 2025, prominent pro-Palestine hacktivist collective “Dark Storm Team” posted on its Telegram channel, claiming to have carried out a series of DDoS attacks targeting various Indian government institutions and financial organizations. Some of the websites allegedly targeted include those of the following entities:

  • Ministry of Commerce and Industry
  • Ministry of External Affairs
  • Ministry of Defence
  • Department of Telecommunications
  • Reserve Bank of India
  • Punjab National Bank

There is a likely chance that these attacks took place, given the provision of checkhost links by Dark Storm Team and the collective’s other recent activity. Any impact upon the targeted organizations is unlikely to be sustained or significant, however.

On May 8, 2025, pro-Pakistan hacktivist collective “AnonSec” claimed on its Telegram channel to have successfully conducted DDoS attacks against multiple Indian government websites and institutions and provided checkhost links to verify its claims.

Hacktivist groups often conduct attacks and select targets opportunistically, and notable geopolitical events—such as a rise in state tensions or the outbreak of conventional conflict—often provide the justification necessary to target entities perceived as socially, politically, or ideologically misaligned. However, hacktivist collectives often falsely claim responsibility for attacks against prominent targets. Similarly, the complexity or impact of attacks are often exaggerated in a bid to garner publicity and accumulate media attention.

On May 12, 2025, ZeroFox observed a Telegram post by pro-India hacking collective “Team Ucc” claiming responsibility for the alleged breach of digital infrastructure associated with two Pakistan-based victims: Dynamic Engineering and Automation (an engineering company) and Jaunt Solutions (a provider of business solutions software). 

Team Ucc claimed to have leaked the organizations’ “entire database”, but the link provided to access the data sample appears to be broken. This suggests there is a likely chance such claims are exaggerated or fabricated.

Pro-Palestinian hacktivist groups have reportedly announced collaboration with pro-Pakistani hacktivists in the targeting of India-based infrastructure. 

  • Hacktivist collectives such as “Vulture” (an Iran-based collective), “RipperSec” (likely a Malaysia-based collective), and “Mysterious Team” (a Bangladesh-based collective) have all announced their intent to support Pakistan on their respective messaging platforms.

Collaboration between hacktivist groups is commonly observed and is usually announced via social media platforms such as X (formerly Twitter) or messaging channels such as Telegram. Allegiances are often shaped by perceived shared injustices underpinned by ideological, religious, political, or national beliefs. Hacktivist collectives are very likely collaborating in support of Pakistan due in part to the perceived pro-Israel and pro-Western stature exerted by India on the global stage.

It is likely that the current ceasefire agreement between India and Pakistan will sustain, though continued tensions in the Kashmir region will almost certainly continue to hamper India-Pakistan state relations. As tensions continue to reduce, there is a very likely chance that hacktivism activities emanating from pro-India and pro-Pakistan collectives will reduce in intensity and tempo. Collectives that have historically displayed targeting patterns that are not immediately pertinent to the India-Pakistan region—particularly those with pro-Russian and anti-Israel agendas—will very likely resume attacks against traditional targets.

ZeroFox Intelligence Recommendations

  • Develop a comprehensive incident response strategy.
  • Deploy a holistic patch management process, and ensure all IT assets are updated with the latest software updates as quickly as possible. 
  • Adopt a Zero-Trust cybersecurity posture based upon a principle of least privilege, and implement network segmentation to separate resources by sensitivity and/or function.
  • Implement phishing-resistant multi factor authentication (MFA), secure and complex password policies, and ensure the use of unique and non-repeated credentials.
  • Ensure critical, proprietary, or sensitive data is always backed up to secure, off-site, or cloud-based servers at least once per year—and ideally more frequently. 
  • Configure email servers to block emails with malicious indicators, and deploy authentication protocols to prevent spoofed emails.
  • Proactively monitor for compromised accounts and credentials being brokered in deep and dark web (DDW) forums.
  • Leverage cyber threat intelligence to inform the detection of relevant cyber threats and associated TTPs.

Scope Note

ZeroFox Intelligence is derived from a variety of sources, including—but not limited to—curated open-source accesses, vetted social media, proprietary data sources, and direct access to threat actors and groups through covert communication channels. Information relied upon to complete any report cannot always be independently verified. As such, ZeroFox applies rigorous analytic standards and tradecraft in accordance with best practices and includes caveat language and source citations to clearly identify the veracity of our Intelligence reporting and substantiate our assessments and recommendations. All sources used in this particular Intelligence product were identified prior to 7:00 AM (EDT) on May 16, 2025; per cyber hygiene best practices, caution is advised when clicking on any third-party links.

Appendix: ZeroFox Intelligence Probability Scale 

All ZeroFox intelligence products leverage probabilistic assessment language in analytic judgments. Qualitative statements used in these judgments refer to associated probability ranges, which state the likelihood of occurrence of an event or development. Ranges are used to avoid a false impression of accuracy. This scale is a standard that aligns with how readers should interpret such terms.

Tags: Dark Web MonitoringThreat Intelligence

See ZeroFox in action