The CPGRAMS cyberattack has disrupted one of India’s most important government websites after the hacktivist group known as THE GARUDA EYE claimed responsibility for launching a major Distributed Denial-of-Service (DDoS) assault in November 2025. The attack briefly affected access to the Centralised Public Grievance Redress and Monitoring System (CPGRAMS), a platform used nationwide by citizens to submit and track complaints against government departments.
CPGRAMS is operated by India’s Department of Administrative Reforms and Public Grievances. It serves as the digital link between citizens and the central and state governments, handling thousands of public issues daily. A disruption of this scale has raised fresh questions about the resilience of India’s online governance infrastructure.
Threat Summary
| Threat Actor | THE GARUDA EYE |
| Attack Type | Distributed Denial-of-Service (DDoS) |
| Sector | Government Administration |
| Country | India |
| Date Observed | November 11, 2025 |
| Source | Telegram Announcement by Garuda Eye |
Overview of the Incident
On November 11, 2025, Garuda Eye announced on its Telegram channel that it had successfully targeted India’s CPGRAMS website. The group claimed responsibility for flooding the portal with large volumes of traffic, temporarily knocking it offline.
During the attack window, users across multiple regions reported timeouts and slow response times. Although government technicians later restored service, the disruption drew national media attention and sparked renewed debate over India’s preparedness against politically motivated cyberattacks.
Who Is Garuda Eye?
Garuda Eye is a relatively new hacktivist collective that has emerged during 2025. Its messaging on Telegram suggests nationalist or political motives rather than financial gain. The group claims to focus on Indian government websites and administrative portals, seeking to draw attention to perceived corruption or inefficiency.
Unlike ransomware groups, Garuda Eye does not demand payment. Its operations rely on coordinated DDoS attacks that overwhelm targets with fake traffic, causing downtime without directly stealing data. This strategy aligns with traditional hacktivism, where visibility and disruption are the primary objectives.
Understanding DDoS Attacks
A Distributed Denial-of-Service (DDoS) attack occurs when attackers flood a target server with enormous amounts of traffic from multiple devices, often part of a botnet. When the server cannot handle the surge, legitimate users lose access.
Modern DDoS campaigns leverage networks of compromised IoT devices, cloud servers, or hijacked routers. Attackers may use layered attack vectors—HTTP floods, UDP packets, or DNS amplification—to bypass defenses.
In the case of the CPGRAMS cyberattack, Garuda Eye used a high-volume traffic burst to temporarily disable the website’s ability to respond to legitimate user requests.
Impact on CPGRAMS and Public Services
The CPGRAMS portal functions as the central hub for lodging grievances across all ministries and state departments. Any downtime directly affects citizens’ ability to register and follow up on complaints.
During the DDoS attack:
- Users experienced intermittent outages and failed submissions.
- Complaint-tracking dashboards displayed repeated timeout errors.
- Backend communication between departments slowed significantly.
- Some data transmissions may have been interrupted, requiring verification.
Although the disruption lasted only a few hours, it underlined how critical the platform is for everyday civic engagement in India.
Why the CPGRAMS Portal Was Targeted
High-profile hacktivist attacks are typically chosen for their symbolic value. CPGRAMS represents transparency, accountability, and direct citizen oversight of government performance. Disrupting it sends a political message questioning the government’s ability to protect digital services.
Garuda Eye’s posts indicated the motive was to “demonstrate weakness” in India’s cybersecurity posture rather than to extort funds. The group also hinted at future attacks on other administrative websites, suggesting an ongoing campaign rather than a single incident.
Technical Details of the CPGRAMS Attack
Analysts reviewing early telemetry from government network gateways observed patterns consistent with large-scale DDoS activity. The flood reportedly peaked at several gigabits per second, targeting multiple endpoints on CPGRAMS’s public servers.
Traffic analysis revealed common attack types:
- HTTP GET and POST floods targeting login and complaint pages.
- Layer-7 application floods that exhausted CPU resources.
- UDP amplification using open DNS resolvers.
- Botnet activity from global IP ranges, primarily in Southeast Asia and Eastern Europe.
India’s National Informatics Centre (NIC), which hosts many government portals, worked with service providers to filter malicious traffic and reroute requests through backup nodes.
Garuda Eye’s Propaganda Campaign
Following the incident, Garuda Eye released images on Telegram showing the CPGRAMS homepage marked “Target Down.” The group celebrated the event as a “success for transparency,” claiming it had exposed poor government readiness.
The group also urged followers to suggest additional Indian government domains for future attacks. Its communication style mirrors that of older hacktivist movements such as Anonymous, blending political statements with self-promotion and community engagement.
India’s History with Hacktivist Threats
India has long been a frequent target of hacktivist campaigns, many of which are driven by political disputes or national rivalries. Over the past decade, government portals, public-sector banks, and educational institutions have all been hit by similar attacks.
CERT-In, India’s national cybersecurity agency, regularly issues advisories on DDoS prevention and response. Still, attackers continue to find ways to overwhelm vulnerable infrastructure, often exploiting unprotected network endpoints or outdated cloud configurations.
Possible Motivations Behind the Attack
Although Garuda Eye’s statements remain vague, analysts believe the CPGRAMS cyberattack was intended to embarrass the government rather than cause material damage. Hacktivists often frame such operations as “digital protests” highlighting perceived inefficiencies or injustice.
These motivations can also intersect with broader geopolitical tensions. In some cases, local hacktivists receive indirect encouragement from foreign actors who view Indian digital platforms as strategic targets.
Response by Indian Authorities
Government IT teams and NIC engineers acted quickly to mitigate the attack, deploying traffic filtering and temporarily scaling capacity. By the end of the same day, most CPGRAMS functions had been restored.
Officials have not confirmed whether law enforcement agencies are investigating Garuda Eye, but similar incidents in the past have prompted police cybercrime units to collaborate with CERT-In and private cybersecurity companies to track attacker infrastructure.
Broader Implications for India’s Digital Governance
The CPGRAMS cyberattack demonstrates how vulnerable public-facing digital services can be in the absence of robust network protection. India’s Digital India initiative has transformed how citizens interact with the state, but it also exposes a wider attack surface.
A single DDoS assault can now interrupt essential government functions ranging from public complaint tracking to welfare program administration. This makes DDoS resilience an urgent national priority.
Lessons for Other Government Portals
The attack on CPGRAMS provides a case study for other government agencies managing citizen-facing systems:
- Use distributed hosting and redundant data centers to absorb large-scale traffic surges.
- Implement always-on DDoS mitigation from trusted cloud vendors.
- Monitor live traffic using anomaly detection tools.
- Segment backend systems from public interfaces to prevent cascading failures.
- Establish real-time coordination channels between CERT-In, NIC, and external ISPs.
Government administrators must treat DDoS defense as a basic component of service availability, not an afterthought.
Evolution of DDoS Threats
DDoS attacks have evolved from simple network floods to complex, multi-vector assaults. Modern campaigns like Garuda Eye’s use “booter” services that anyone can rent anonymously, dramatically lowering the barrier to entry for hacktivists.
The growing number of unsecured IoT devices worldwide also provides attackers with endless resources to build botnets capable of launching terabit-scale floods.
How to Protect Public Websites
Cybersecurity experts recommend the following best practices for defending public institutions:
- Deploy Web Application Firewalls (WAF) integrated with rate-limiting.
- Adopt content delivery networks (CDNs) that can geographically disperse traffic.
- Enable automatic scaling on cloud platforms to handle bursts safely.
- Conduct regular penetration and load testing to identify weak points.
- Keep infrastructure software and plugins up to date.
Such measures can ensure that even if another CPGRAMS cyberattack occurs, the platform can continue serving citizens with minimal interruption.
Citizen Awareness and Safety
Although DDoS attacks rarely expose personal data, citizens should remain vigilant. Cybercriminals often exploit news of outages to circulate phishing campaigns impersonating government support services.
To stay safe:
- Access CPGRAMS only through its verified domain pgportal.gov.in.
- Ignore emails or messages offering “recovery assistance.”
- Use up-to-date antivirus tools like Malwarebytes to protect devices.
- Report suspicious links or fake sites to CERT-In or official government hotlines.
Maintaining public trust in digital governance requires both technical security and strong communication during incidents.
Garuda Eye’s Future Plans
Following its claim of responsibility for the CPGRAMS cyberattack, Garuda Eye hinted at additional operations targeting government and media websites. Its increasing visibility suggests the group may attempt larger attacks in the coming months.
While the group’s infrastructure remains limited, its social-media presence could inspire other hacktivist collectives to coordinate campaigns against Indian digital assets.
Global Perspective on Hacktivism
The CPGRAMS attack reflects a broader global resurgence in hacktivist activity. Groups across Europe, Asia, and Latin America are using DDoS operations to voice political or ideological messages. Governments worldwide are being forced to strengthen digital resilience and adopt faster incident-response mechanisms.
Experts emphasize that hacktivism, though often dismissed as low-impact, can have real consequences when it undermines public trust in digital infrastructure.
Final Notes
The CPGRAMS cyberattack claimed by Garuda Eye highlights the continuing challenge of defending government systems against politically motivated digital assaults. Although the disruption was temporary, it exposed critical weaknesses in the country’s defensive posture and emphasized the importance of proactive cybersecurity investment.
India’s digital future depends on maintaining the reliability of its online services. Attacks like this serve as reminders that cyber resilience is essential for modern governance.
For detailed reports on emerging cybersecurity incidents and verified data breaches, visit Botcrawl for expert coverage and ongoing analysis.
Sean Doyle
Sean is a tech author and security researcher with more than 20 years of experience in cybersecurity, privacy, malware analysis, analytics, and online marketing. He focuses on clear reporting, deep technical investigation, and practical guidance that helps readers stay safe in a fast-moving digital landscape. His work continues to appear in respected publications, including articles written for Private Internet Access. Through Botcrawl and his ongoing cybersecurity coverage, Sean provides trusted insights on data breaches, malware threats, and online safety for individuals and businesses worldwide.



