Company Details
ministry-of-home-affairs-mha-
1,972
9,210
8135
mha.gov.in
0
MIN_2717114
In-progress


Ministry Of Home Affairs (mha), GOI Company CyberSecurity Posture
mha.gov.inTheÊMinistry of Home AffairsÊ(MHA) or Home Ministry (IAST: G_ha Ma_tr_laya) is a ministry of the Government of India
Company Details
ministry-of-home-affairs-mha-
1,972
9,210
8135
mha.gov.in
0
MIN_2717114
In-progress
Between 700 and 749

MHAG Global Score (TPRM)XXXX

Description: Malaysia’s home minister, Datuk Seri Saifuddin Nasution Ismail, had his WhatsApp account compromised by an attacker using a VPN. The hacker sent malicious links to the minister's contacts, but no financial losses were reported. The Ministry of Home Affairs confirmed the breach and urged the public not to respond to suspicious messages. The incident is under investigation, and law enforcement is working to determine the hacker’s location. This attack has raised concerns about Malaysia’s cybersecurity measures.


No incidents recorded for Ministry Of Home Affairs (mha), GOI in 2026.
No incidents recorded for Ministry Of Home Affairs (mha), GOI in 2026.
No incidents recorded for Ministry Of Home Affairs (mha), GOI in 2026.
MHAG cyber incidents detection timeline including parent company and subsidiaries

TheÊMinistry of Home AffairsÊ(MHA) or Home Ministry (IAST: G_ha Ma_tr_laya) is a ministry of the Government of India


AIESEC develops leadership among youth aged 18 to 30 and contributes to strengthening the global employability market by providing an end-to-end international talent recruitment solution for Enterprises, NGOs, and Start-ups. AIESEC is the world's largest youth-run organization developing the leader
The American Red Cross prevents and alleviates human suffering in the face of emergencies by mobilizing the power of volunteers and the generosity of donors. Each day, thousands of people – people just like you – provide compassionate care to those in need. Our network of generous donors, voluntee

UNICEF works in some of the world’s toughest places, to reach the world’s most disadvantaged children. To save their lives. To defend their rights. To help them fulfill their potential. Across 190 countries and territories, we work for every child, everywhere, every day, to build a better world fo

The International Rescue Committee responds to the world’s worst humanitarian crises and help people to survive, recover, and gain control of their future. Founded in 1933 at the request of Albert Einstein, the IRC offers lifesaving care and life-changing assistance to refugees and displaced peopl
IEEE is the world’s largest technical professional organization and is a public charity dedicated to advancing technological innovation and excellence for the benefit of humanity. IEEE and its members inspire a global community through its highly cited publications, conferences, technology standards

We support peace and prosperity by building connections, understanding and trust between people in the UK and countries worldwide. We uniquely combine the UK’s deep expertise in arts and culture, education and the English language, our global presence and relationships in over 100 countries, our un

The Salvation Army is the nation's largest direct provider of social services. Annually, we help millions overcome poverty, addiction, and spiritual and economic hardships by preaching the gospel of Jesus Christ and meeting human needs in His name without discrimination in nearly every zip code.

Médecins Sans Frontières (MSF) is an international, independent, medical humanitarian organisation working to provide medical assistance to people affected by conflict, epidemics, disasters, or exclusion from healthcare. Since our founding in 1971, we’ve grown to a global movement delivering human

Established in 1863, the International Committee of the Red Cross (ICRC) works worldwide to provide humanitarian help for people affected by conflict and armed violence and to promote the laws that protect victims of war. An independent and neutral organization, its mandate stems essentially from th
.png)
India's fragmented cybersecurity framework is failing against rising cyber threats. This report explains why a unified Ministry of Cyber...
The Union Minister Amit Shah, Ministry of Home Affairs (MHA) and Ministry of Cooperation inaugurated the “EARTH Summit 2025”,...
New Delhi- Innefu Labs, a leading Indian AI-driven Company in National and Cyber Security, announced that its flagship products Innsightand...
Our Web Correspondent. Posted on 10 Oct 2025. 12:07 PM. File Image. Summary. The Ministry of Home Affairs (MHA), through its Indian Cyber Crime Coordination...
This article highlights the significance of the recent Allocation of Business Rules amendment and maps and analyzes India's current...
J&K Govt bans USB/pen drives and WhatsApp for official use, mandates secure channels per MHA, CERT-In directives; order effective 25 August...
Prayagraj: In a significant security advisory dated July 14, the Ministry of Home Affairs has issued a detailed letter to vice-chancellors...
Gauhati University NSS Cell held a cyber security lecture on July 11 under the national Cyber Security Internship by I4C, MHA, Govt of India...
In 2024, people in Karnataka lost Rs 2948.08 crore in more than 1,36209 cyber fraud incidents reported on the National Crime Reporting...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Ministry Of Home Affairs (mha), GOI is http://www.mha.gov.in.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI’s AI-generated cybersecurity score is 713, reflecting their Moderate security posture.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI is not certified under SOC 2 Type 1.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI is not listed as GDPR compliant.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI does not currently maintain PCI DSS compliance.
According to Rankiteo, Ministry Of Home Affairs (mha), GOI is not compliant with HIPAA regulations.
According to Rankiteo,Ministry Of Home Affairs (mha), GOI is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Ministry Of Home Affairs (mha), GOI operates primarily in the Non-profit Organizations industry.
Ministry Of Home Affairs (mha), GOI employs approximately 1,972 people worldwide.
Ministry Of Home Affairs (mha), GOI presently has no subsidiaries across any sectors.
Ministry Of Home Affairs (mha), GOI’s official LinkedIn profile has approximately 9,210 followers.
Ministry Of Home Affairs (mha), GOI is classified under the NAICS code 8135, which corresponds to Others.
No, Ministry Of Home Affairs (mha), GOI does not have a profile on Crunchbase.
Yes, Ministry Of Home Affairs (mha), GOI maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/ministry-of-home-affairs-mha-.
As of January 25, 2026, Rankiteo reports that Ministry Of Home Affairs (mha), GOI has experienced 1 cybersecurity incidents.
Ministry Of Home Affairs (mha), GOI has an estimated 21,306 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an incident response plan activated with unknown, and law enforcement notified with yes, and communication strategy with public advisory to ignore messages..
Title: Malaysia Home Minister's WhatsApp Account Hacked
Description: Malaysia’s home minister had his WhatsApp account hacked and then abused to send malicious links to his contacts.
Date Detected: 2023-10-06
Date Publicly Disclosed: 2023-10-06
Type: Phishing
Attack Vector: WhatsApp Account Compromise
Vulnerability Exploited: Unspecified
Threat Actor: Unknown
Motivation: Financial, Data Theft
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through WhatsApp Account.

Financial Loss: None reported
Data Compromised: Unknown
Systems Affected: WhatsApp
Brand Reputation Impact: Public criticism and ridicule
Average Financial Loss: The average financial loss per incident is $0.00.

Entity Name: Datuk Seri Saifuddin Nasution Ismail
Entity Type: Government Official
Industry: Government
Location: Malaysia
Customers Affected: WhatsApp contacts

Incident Response Plan Activated: Unknown
Law Enforcement Notified: Yes
Communication Strategy: Public advisory to ignore messages
Incident Response Plan: The company's incident response plan is described as Unknown.

Lessons Learned: Mobile phishing scams are increasingly common in Malaysia.

Recommendations: Increase cybersecurity measures and public awareness.
Key Lessons Learned: The key lessons learned from past incidents are Mobile phishing scams are increasingly common in Malaysia.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Increase cybersecurity measures and public awareness..
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Police Press ConferenceDate Accessed: 2023-10-06.

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Public advisory to ignore messages.

Entry Point: WhatsApp Account

Root Causes: Unknown
Last Attacking Group: The attacking group in the last incident was an Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2023-10-06.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-10-06.
Highest Financial Loss: The highest financial loss from an incident was None reported.
Most Significant Data Compromised: The most significant data compromised in an incident was Unknown.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach was Unknown.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Mobile phishing scams are increasingly common in Malaysia.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Increase cybersecurity measures and public awareness..
Most Recent Source: The most recent source of information about an incident is Police Press Conference.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Ongoing.
Most Recent Entry Point: The most recent entry point used by an initial access broker was an WhatsApp Account.
.png)
The WP Go Maps (formerly WP Google Maps) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the processBackgroundAction() function in all versions up to, and including, 10.0.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify global map engine settings.
The Save as PDF Plugin by PDFCrowd plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘options’ parameter in all versions up to, and including, 4.5.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. NOTE: Successful exploitation of this vulnerability requires that the PDFCrowd API key is blank (also known as "demo mode", which is the default configuration when the plugin is installed) or known.
The Hustle – Email Marketing, Lead Generation, Optins, Popups plugin for WordPress is vulnerable to arbitrary file uploads due to incorrect file type validation in the action_import_module() function in all versions up to, and including, 7.8.9.2. This makes it possible for authenticated attackers, with a lower-privileged role (e.g., Subscriber-level access and above), to upload arbitrary files on the affected site's server which may make remote code execution possible. Successful exploitation requires an admin to grant Hustle module permissions (or module edit access) to the low-privileged user so they can access the Hustle admin page and obtain the required nonce.
The WP Directory Kit plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.9 via the wdk_public_action AJAX handler. This makes it possible for unauthenticated attackers to extract email addresses for users with Directory Kit-specific user roles.
The Meta-box GalleryMeta plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.