Airports In Kerala Deny That Their Websites Have Been Hacked

  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  

India: Officials of two airports in Kerala have dismissed reports that their websites have been hacked. According to the Thiruvananthapuram airport authorities, the website that was hacked was one developed by some regular passengers and was in no way connected to the airport.

According to George G Tharakan, director of the Trivandrum International Airport said that, “There is no separate website for the airport. The website which was hacked was being run by a private agency. The official details of the airport are posted on the website of the Airports Authority of India.”

A website trivandrumairport.com was hacked by anonymous hackers on Tuesday. The home page showed the message that the website was hacked by ‘Kashmiri Cheettah‘ which allegedly belongs to the group Pak Cyber Attackers. The page also displayed a danger symbol. However, it was restored by Wednesday morning.

According to communique from Cochin International Airport also denied the report. “A national TV channel this morning carried the news that Pakistani hackers has hacked our website. Please be informed that Cochin International Airport Ltd’s website is not hacked.  www.cial.aero is our official website, which is intact. The one which is hacked (with name cochiairport.com) doesn’t belong to CIAL.”

The following two tabs change content below.

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]om

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Leave a Reply