HomeNewsGovernment’s UPSC website hacked, plays Doraemon song in background

Government’s UPSC website hacked, plays Doraemon song in background

The UPSC (Union Public Service Commission) website that is managed by the Indian Government has been infiltrated by hackers today. The intruders have defaced the homepage of the website, and it shows a Doraemon picture along with the caption “Doraemon!!!! Pick up the call”. The website also automatically starts playing the cartoon series title song in the background.

This isn’t the first time we have seen government websites being infiltrated and defaced. In many cases, it has been noticed that these intrusions are done by so-called “white hat hackers” who have previously tried to alert the authorities about vulnerabilities but have been given a cold shoulder. In an attempt to bring attention to the issue, the same vulnerability is exploited, the websites are defaced, and patches are released after public humiliation.

The Narendra Modi led government has been stressing on its initiative Digital India, but these incidents have continued to happen. The website in question here is part of the GOV.IN registry, meaning only approved government institutions can use the domain. It is still unclear whether only the front end has been exploited, or has there been any data robbery at the core database level.

We shall update this story once a statement or release is available from relevant authorities.

You can check out the website here

Previous post
Review: Mi Pocket Speaker 2 - Pocket it right away!
under display fingerprint scanner
Next post
OnePlus 6T confirmed to have an in-display fingerprint scanner


  1. Ritesh Shanker
    September 11, 2018 at 4:19 AM — Reply

    India is a joke, so are its intellectuals..

  2. yuri
    September 11, 2018 at 5:14 AM — Reply

    for some reason my first comment didn’t show
    i made a smol goofy video on this upsc hack (basically subtitles )https://www.youtube.com/watch?v=6A1zEvREzec

Leave a reply

Your email address will not be published. Required fields are marked *