Cyber attackers strike flood monitoring system in Goa, India
Ransomware attack has prevented the ability to back up data, with attackers demanding Bitcoin in return for decryption


Cyber attackers have targeted a flood monitoring system with ransomware in Goa, India, demanding Bitcoin in return for decrypting the data.
The Water Resource Department (WRD) runs a flood monitoring system at 15 locations on Goa’s major rivers, designed to monitor water levels as part of its disaster management planning.
However, WRD executive engineer Sunil Karmarkar said the system was struck by a ransomware attack on June 21, taking place between 12am and 2am.
As a result, integrity of the system’s data was altered, preventing the ability to back up the previous data. According to Karmarkar, the server runs on a 24-7 internet line and an absence of antivirus protection and use of outdated firewalls helped facilitate the ransomware attack.
“The server has been under cyberattack of ransomware,” Karmarkar said in a report to authorities. “Under the attack, all the files are encrypted with eking extension and cannot be accessed.
“In a popup and stored file, the attackers are demanding Bitcoin cryptocurrency for the decryption of the data.”
In the aftermath, the flood monitoring system’s data could not be accessed or downloaded from the server, including data related to battery voltages of different stations.
ChannelPro Newsletter
Stay up to date with the latest Channel industry news and analysis with our twice-weekly newsletter
Additionally, data packets regarding 12 of the flood system’s stations could not be transferred to the WIMS server, text messages and emails were unable to be obtained, and old data could not be backed up, Karmarkar added.
Police said they have asked representatives of Hyderabad-based software developer ASTRA Microwave Products being asked to help track down the culprits and better protect the flood monitoring system.
“This work has been awarded to ASTRA Microwave Products Ltd, Hyderabad,” Karmarkar revealed. “The company has been directed to block further damage and upgrade the system and recover the data at their own risk and cost.”
The attack is the latest example of cyber criminals that will attack any organisation and system with ransomware, regardless of its effect on people and society. While some groups such as Lockbit will veer away from targeting organizations such as hospitals and utilities, others – such as the notorious Conti ransomware attackers – are indiscriminate and will not take morals into consideration.
In the wake of the attack, prominent cybersecurity expert Kevin Beaumont took to social media to condemn the cyber criminals for targeting a critical safety system. He said on Twitter: “Whichever ransomware group did this should provide a free decryption key.”
Dan is a freelance writer and regular contributor to ChannelPro, covering the latest news stories across the IT, technology, and channel landscapes. Topics regularly cover cloud technologies, cyber security, software and operating system guides, and the latest mergers and acquisitions.
A journalism graduate from Leeds Beckett University, he combines a passion for the written word with a keen interest in the latest technology and its influence in an increasingly connected world.
He started writing for ChannelPro back in 2016, focusing on a mixture of news and technology guides, before becoming a regular contributor to ITPro. Elsewhere, he has previously written news and features across a range of other topics, including sport, music, and general news.
-
Cleo attack victim list grows as Hertz confirms customer data stolen – and security experts say it won't be the last
News Hertz has confirmed it suffered a data breach as a result of the Cleo zero-day vulnerability in late 2024, with the car rental giant warning that customer data was stolen.
By Ross Kelly
-
‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers
News Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25.
By Emma Woollacott
-
Healthcare systems are rife with exploits — and ransomware gangs have noticed
News Nearly nine-in-ten healthcare organizations have medical devices that are vulnerable to exploits, and ransomware groups are taking notice.
By Nicole Kobie
-
Alleged LockBit developer extradited to the US
News A Russian-Israeli man has been extradited to the US amid accusations of being a key LockBit ransomware developer.
By Emma Woollacott
-
February was the worst month on record for ransomware attacks – and one threat group had a field day
News February 2025 was the worst month on record for the number of ransomware attacks, according to new research from Bitdefender.
By Emma Woollacott
-
CISA issues warning over Medusa ransomware after 300 victims from critical sectors impacted
News The Medusa ransomware as a Service operation compromised twice as many organizations at the start of 2025 compared to 2024
By Solomon Klappholz
-
Warning issued over prolific 'Ghost' ransomware group
News The Ghost ransomware group is known to act fast and exploit vulnerabilities in public-facing appliances
By Solomon Klappholz
-
The Zservers takedown is another big win for law enforcement
News LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline
By Solomon Klappholz