According to sources, the inquiry into the hacking of the AIIMS system is currently based on the RAM dump because all of the affected PCs at AIIMS have had their memory dumps sent for analysis.
The hard disc containing the dump data has been transferred for testing to Gujarat’s National Forensic Science University (NFSU), where a report is anticipated shortly.
In an exclusive interview with ABP News on Friday, Rajeev Chandrashekhar, the Union Minister of State for Information Technology, claimed that the current episode of server hacking at AIIMS is not a trivial event and that there appears to be a conspiracy behind it.
The minister stated that the government will introduce a Digital Data Protection Bill in the budget session in an effort to guarantee the privacy of the citizens’ data and that the CERT (Computer Emergency Response Team), NIA, and police are looking into the AIIMS server hack case.
According to the sources, the investigation is being conducted not only by the IFSO unit of the Delhi Police but also by the FSL of the Delhi Government, CFSL of the CBI, DRDO, and NFSU of Gujarat.
According to additional sources, the investigative report will make clear where the hacking was carried out.
Notably, a high-level meeting about the server hack issue had been called by the Union Home Ministry.
Other officials, including senior personnel of the Intelligence Bureau, NIC, NIA, Delhi Police, and MHA attended the high-level meeting called by the Ministry of Home Affairs in addition to those connected to the AIIMS management.
When the server for the All India Institute of Medical Sciences (AIIMS), Delhi, went down, hackers allegedly demanded almost Rs 200 crore in cryptocurrencies, according to news agency PTI. It’s possible that the leak exposed the data of three to four crore patients.
According to reports, the NIA will likely look into the incident to see if there was a terrorist component. According to earlier reports, in addition to patient data, the AIIMS server also contains information on VIPs, and there is a chance that this information could be exposed as a result of the cyberattack.