Skip to playerSkip to main contentSkip to footer
  • 2 years ago
The Department of Information and Communications Technology (DICT) said on Monday, Oct. 16 that the House of Representatives (HOR) cyberattack may have been carried out by local hackers. (MB Video by Sonny Daanoy)

READ: https://mb.com.ph/2023/10/16/local-hackers-may-be-behind-house-website-cyberattack-dict


Subscribe to the Manila Bulletin Online channel! - https://www.youtube.com/TheManilaBulletin

Visit our website at http://mb.com.ph
Facebook: https://www.facebook.com/manilabulletin
Twitter: https://www.twitter.com/manila_bulletin
Instagram: https://instagram.com/manilabulletin
Tiktok: https://www.tiktok.com/@manilabulletin

#ManilaBulletinOnline
#ManilaBulletin
#LatestNews

Category

🗞
News
Transcript
00:00 Just from the wordings alone, it includes defacement of the website of the proper threat
00:09 because it was in Tagalog.
00:11 So we highly suspect that these are local threat actors.
00:14 But again, we ask the understanding of the public if we can actually abolish the names of these persons
00:22 because of questions about national security.
00:26 And then, because in other places, data breach, you get data.
00:31 How about here in the House of Representatives?
00:33 Do you get data from that website?
00:36 Well, initially, we only saw that there was a defacement of the website,
00:41 that there were alterations in the logs, alterations in the subdatas of the website.
00:46 We're still conducting a thorough investigation because of the defacement of the website.
00:53 If there was any extraction of any data, any sensitive data, any scientific data
00:58 from the House of Representatives website.
01:00 We're still looking into the motives.
01:02 When we know, when you suspect someone of doing this, we try to find out their motives as well.
01:09 But again, we can only see that there is a bandwagon effect,
01:13 that the others are just being a nuisance to the public because they are just following the rules.
01:21 There are INC's that are close to the public to help assess the integrity and security level of their systems.
01:34 While others on the other side of the spectrum, there are INC's that are just following the rules.
01:40 And they are not usually present in the incidents that happen to their computer systems.
01:47 [BLANK_AUDIO]

Recommended