Download Leak Audios Of PMLN Leaked By Indishell Hacker

Download Leak Audios Of PMLN Leaked By Indishell Hacker.

Download Leak Audios Of PMLN Leaked

A conversation between Sharif and an unidentified official was allegedly recorded in one of the stolen audio files. The piece went viral on social media. It discussed the possibility of expediting the import of machinery from India for power projects by Maryam Nawaz’s son-in-law. The second audio tape shows the conversation between the Prime Minister, Interior Minister Rana Sanaullah, and Defense Minister Khawaja Asif. SHAHBAZ SHARIF LEAKED AUDIO SALE ON DARK WEB Law Minister Azam Nazir Tarar and Ayaz Sadiq discussed the resignations of PTI MLAs.

Another purported audio clip shows a conversation between the prime minister and PML-N vice president Maryam Nawaz. This audio was regarding the alleged offensive policies of former Finance Minister Miftah Ismail. With reference to the above clip, listeners can hear Maryam Nawaz criticizing the former finance minister. She points out Ismail’s irresponsible behavior and strange antics that make him a target of public ridicule. Also, another voice, identified as PM, agrees. He also mentions Ismail’s notorious habit of cutting corners.

By Indishell Hacker Download Leak Audios Of PMLN Leaked

How Did the Audios Get Leaked? A hacker going by the handle “Indishell” posted the audio clips online for sale. This well-known group of Indian hackers has been attacking Pakistani websites since 2007. The first and third audio clips are approximately two minutes long. The second audio clip, divided into six segments for easy social media sharing, is 12 minutes and 40 seconds long. Additionally, sources claim that the leaked 115-hour-long audio clips are circulating on the dark web. Currently, they are up for auction for $3.5 million.

On September 3, a user going by the handle @ze_lucy uploaded audio samples to Twitter, but no one noticed. On September 3, the minimum price for 8GB of audio was 180 bitcoins, or $20,000. The intelligence agencies, especially the Intelligence Bureau, failed to protect the intellectual integrity of the country. Apart from politics, everyone now has the power to influence key negotiations on security and international concerns. Therefore, the government of Pakistan should cooperate with professionals in the security industry. They can help incorporate cyber resilience into every phase of strategic planning. They can do this by adopting global national cyber security best practices and establishing a national cyber security center.

What Do the Leaked Audios Entail?

According to reports, an international hacker had access to roughly 100 hours of allegedly taped discussions from the PM Office.

A conversation between Sharif and an unnamed official supposedly took place in one of the stolen audio files. The snippet became popular on social media. It discussed the potential for Maryam Nawaz’s son-in-law expediting the import of machinery from India for power projects.

How Did the Audios Get Leaked?

A hacker going by the handle “indishell” posted the audio clips for sale online. This known group of Indian hackers has been attacking Pakistani websites since 2007. The first and third audio clips are about two minutes apiece. The second audio clip, which is separated into six segments for simple social media sharing, lasts 12 minutes and 40 seconds.

Additionally, sources claim that the leaked 115-hour-long audio clips have been doing rounds on the dark web. Currently, they are up for auction for $3.5 million.

On September 3, a user going by the handle @ze_lucy uploaded audio samples to Twitter, but no one took note. On September 3, the 8GB audio had a minimum price of 180 bitcoins, or $20,000.

Exclusive: Hacker was demanding $3.5 million in order to leak the audio files but his latest tweet shows he’s going to release audio files on Friday 9/30/2022.

Is This a Case of Cyber Security Concern?

Cybersecurity specialists raise their concerns by claiming that government organizations do not have the appropriate resources to handle cyberattacks.

However, the possibility that someone might have recorded the conversations on their phone is slight. This is due to the lengthy duration of the audios, which points evidence towards gadgets that may have been bugged for a long time.

One of the audios whose sample was leaked seems to be extremely clear. Sources claim that every minister present at the discussions had their mobile microphones compromised.

Even Shireen Mazari, former human rights minister of the PTI government had speculation regarding the intellectual compromise. According to her, the hacking was possible due to several devices hidden in the PM house.

Download Leak By Indishell Hacker Audios Of PMLN Leaked

However, it is too soon, according to experts, to determine if the security compromise was due to an internal attack or an external hack.

In an age where spyware and various other malicious software are prevalent, security should take further measures to prevent cyber-attacks. The leaking of the audio files could be the work of notorious, yet efficient spyware such as Pegasus.

Pegasus is an Israeli cyber arms company whose software users can download on any Android or Apple smartphone. It houses an array of techniques that can exploit the subject’s system. The more modern versions of Pegasus employ zero-click attacks, which do not require interaction with the system.

In some cases, most countries employ such applications to spy on other countries for political rivalry purposes. Through this, they may be able to gather confidential intel that they could use for strategic or blackmailing purposes.

Conclusion

The intelligence organizations, particularly the Intelligence Bureau, failed in protecting the country’s intellectual integrity. Apart from politics, everyone now has the power to influence major talks on security and international concerns.

Therefore, the Government of Pakistan must cooperate with professionals in the security industry. They can help incorporate cyber resilience at every phase of strategic planning.

They can do this by adopting worldwide best practices of national cybersecurity and establishing a national cybersecurity center.