logo

All Exams

Notifications

All Exams

Explore All Exams at KGS

All Exams
Home>Current Affairs>Cyber Attack on Karnataka’s Kaveri 2.0 portal
Current Affairs made simple.

Current Affairs provides you with the best compilation of the Daily Current Affairs taking place across the globe: National, International, Sports, Science and Technology, Banking, Economy, Agreement, Appointments, Ranks, and Report and General Studies

banner-image

Cyber Attack on Karnataka’s Kaveri 2.0 portal

Context: 

The Kaveri 2.0 portal of Karnataka which is used for property registrations, faced performance problems possibly due to a cyber-attack in December 2024 and January 2025.

More on the news:

  • Karnataka government officials blamed a suspected Artificial Intelligence-based Distributed Denial of Service (DDoS) attack for the recent crash of the Kaveri portal.
  • As a result of the cyber-attack, property registration and document-related citizen services went almost to a standstill in the state. 
  • The Kaveri 2.0 portal was restored on February 5 after the DDoS attack.

What is a DDoS Attack?

A Distributed Denial of Service (DDoS) is a common technique used to temporarily bring down websites. It is not the same as hacking into a website. These are well-orchestrated attacks on the web servers of a website and the domain name servers.

A DDoS attack (Distributed Denial of Service) tries to disrupt the normal working of a website or online service by overloading the website with excess internet traffic.

The attack can saturate (fill up) the bandwidth of a website, or target weaknesses in the website's system to make it stop working.

This causes service downtime, meaning the site cannot be used by people thus leading to disruptions.

Unlike a Denial of Service (DoS) attack, which typically involves a single source, a DDoS attack leverages multiple compromised systems, often infected with malware, to generate the traffic. These compromised systems are collectively known as a botnet. Impact of a DDoS Attack

Loss of revenue because customers can’t access the service.

Reputational damage because the company is seen as unable to protect against cyber threats.

DDoS attacks don’t steal data, but they can be used to distract while other attacks (like stealing data) happen.

Such attacks may be aimed at saturating the bandwidth of a particular site, exploiting weaknesses in the network protocol stack, or targeting specific weaknesses in applications or services.

While DDoS attacks do not directly steal data, they can be used as a distraction while other forms of cyberattacks, such as data breaches, are executed. 

Types of DDOS attacks: DDoS attacks fall under three primary categories:

1. A volumetric attack overwhelms the network layer with falsely appearing legitimate traffic. This type of attack is the most common form of DDoS attack.

2. A protocol attack causes a service disruption by exploiting a weakness in the protocol stack layers. 

3. A resource (or application) layer attack targets web application packets and disrupts the transmission of data between hosts.

Other Recent DDoS Attacks:

  • In August 2024, Elon Musk’s X (formerly Twitter) was hit by a DDoS attack, causing service interruptions just before his planned chat with Donald Trump.
  • In 2015, GitHub (Microsoft) was attacked by a botnet from China, aiming to shut down projects that helped people bypass Chinese internet censorship.

What must be done?

  • It is important for organizations to prepare and implement strong protection strategies to protect their digital assets and maintain user trust.

Key Suggestions: 

  • Use advanced traffic filters to separate real users from harmful ones.
  • Bot detection technologies, such as CAPTCHA challenges and behavioural analysis, can identify and block automated tools or bots. Limit request frequency to prevent excessive traffic.
  • Perform regular security checks and improve login protection.

For the user, knowing about the risks of phishing and other social engineering attacks can help prevent account compromises. Companies can encourage the use of strong passwords and multi-factor authentication to enhance security.

Way Forward:

The DDoS attack is a wake-up call for organizations, especially government agencies, to focus on cybersecurity. The battle against DDoS attacks is ongoing, but with the right strategies and vigilance, organisations can safeguard their digital assets and maintain the trust of their users.

footer image

The most trusted learning platform on your phone

With our training programs, learning online can be a very exciting experience! Take the next step toward achieving your professional and personal objectives

app-storeplay-store
logo
Khan Global Studies Pvt. Ltd. 5th Floor,
A13A, Graphix 1 Tower B, Sector 62,
Noida, Uttar Pradesh 201309

Course Related Query: [email protected] Store Related Query: [email protected]

Get Free Academic Counseling & Course Details

KGS best learning platform

About Khan Global Studies

We love learning. Through our innovative solutions, we encourage ourselves, our teams, and our Students to grow. We welcome and look for diverse perspectives and opinions because they enhance our decisions. We strive to understand the big picture and how we contribute to the company’s objectives. We approach challenges with optimism and harness the power of teamwork to accomplish our goals. These aren’t just pretty words to post on the office wall. This is who we are. It’s how we work. And it’s how we approach every interaction with each other and our Students.


What Makes Us Different

Come with an open mind, hungry to learn, and you’ll experience unmatched personal and professional growth, a world of different backgrounds and perspectives, and the freedom to be you—every day. We strive to build and sustain diverse teams and foster a culture of belonging. Creating an inclusive environment where every students feels welcome, appreciated, and heard gives us something to feel (really) good about.

Copyright 2025 KhanGlobalStudies

Have a question?

Get Free academic Counseling & Course Details

floatButton