黑客利用薄弱的密码窃取和出售来自印度机构的50 000个私人视频,暴露了重大的网络安全缺陷。
Hackers exploited weak passwords to steal and sell 50,000 private videos from Indian institutions, exposing major cybersecurity flaws.
印度发生的一次重大网络漏洞与“admin123”等弱默认密码有关,黑客允许访问和出售来自 20 个邦的医院、学校和家庭的 50,000 多个私人视频剪辑。
A major cyber breach in India, linked to weak default passwords like "admin123," allowed hackers to access and sell over 50,000 private video clips from hospitals, schools, and homes across 20 states.
这次袭击的起因是Parit Dhameliya和Rohit Sisodiya帮凶Rohit Sisodiya领导的一个团伙,他们使用了野蛮武力方法,破坏了过时的系统,窃取的录像在Telegram和黑暗网络平台上流传到2025年6月。
The attack, traced to a group led by Parit Dhameliya and accomplice Rohit Sisodiya, used brute force methods and compromised outdated systems, with stolen footage circulating on Telegram and dark web platforms into June 2025.
尽管在2025年初遭到逮捕,但违规事件暴露了普遍的网络安全失灵,促使人们呼吁进行强制性审计和加强数据保护法。
Despite arrests in early 2025, the breach exposed widespread cybersecurity failures, prompting calls for mandatory audits and stronger data protection laws.