
Indian Institute of Technology, Kharagpur Company Cyber Security Posture
iitkgp.ac.inOn Sept. 15, 1956, the Parliament of India passed an act known as the Indian Institute of Technology(Kharagpur) Act declaring this Institute as an Institute of national importance. The Institute was also given the status of an autonomous University. From this modest start in 1950, IIT Kharagpur has been engaged in a steady process of development with about 27 academic departments and schools, 7 centres of excellence. the vast tree-laden campus, spreading over 2100 acres has a self contained township of over 15,000 inhabitants. Currently we have about 600 faculty, 1700 employees and 10000 students on the campus.
IITK Company Details
indian-institute-of-technology-kharagpur
5409 employees
248695.0
611
Higher Education
iitkgp.ac.in
146
IND_1977746
In-progress

Between 900 and 1000
This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

.png)

Indian Institute of Technology, Kharagpur Company Scoring based on AI Models
Model Name | Date | Description | Current Score Difference | Score |
---|---|---|---|---|
AVERAGE-Industry | 03-12-2025 | This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers. | N/A | Between 900 and 1000 |
Indian Institute of Technology, Kharagpur Company Cyber Security News & History
Entity | Type | Severity | Impact | Seen | Url ID | Details | View |
---|---|---|---|---|---|---|---|
Indian Institute of Technology, Kharagpur | Breach | 60 | 3 | 12/2016 | IND253131123 | Link | |
Rankiteo Explanation : Attack with significant impact with internal employee data leaksDescription: Cryptolulz666 gained access to user data, including emails, passwords, phone numbers, and security questions, by breaking into the Indian Institute of Technology Kharagpur's database. The hacker claimed to have access to over 12,000 users' data, but he only disclosed a small percentage of it on Pastebin as evidence of the attack. The hacker draws attention to the companies' lax security once more. His goal is to make the authorities aware of this. Although there were around 12555 users in the database, the hacker only disclosed less than 25% of it because the organisation could face legal action for this information disclosure. |
Indian Institute of Technology, Kharagpur Company Subsidiaries

On Sept. 15, 1956, the Parliament of India passed an act known as the Indian Institute of Technology(Kharagpur) Act declaring this Institute as an Institute of national importance. The Institute was also given the status of an autonomous University. From this modest start in 1950, IIT Kharagpur has been engaged in a steady process of development with about 27 academic departments and schools, 7 centres of excellence. the vast tree-laden campus, spreading over 2100 acres has a self contained township of over 15,000 inhabitants. Currently we have about 600 faculty, 1700 employees and 10000 students on the campus.
Access Data Using Our API

Get company history
.png)
IITK Cyber Security News
Bessemer Venture Partners welcomes Pankaj Mitra as Partner
India's AI and tech landscape is undergoing a significant transformation across entrepreneurship and venture capital โ driven by governmentย ...
Critical Intel Trust Domain Extensions Isolation Vulnerability Exposes Sensitive Data
Researchers from the IIT Kharagpur and Intel Corporation has uncovered a significant vulnerability in Intel's Trust Domain Extensions.
IIT-Kharagpur graduate among 15 held in Telangana for circulating child abuse content; all repeat offende
Telangana Cyber Security Bureau arrested fifteen individuals for child sexual exploitation content. The accused were watching, storing,ย ...
IIT Madras launches Cybersecurity Centre to boost Fundamental & Applied Research in India
Indian Institute of Technology Madras (IIT Madras) has launched a new cybersecurity centre to boost fundamental and applied research that drivesย ...
IIT Madras Launches Cybersecurity Centre, Paving the Way for Research and Solutions
IIT Bombay closed at AIR 66 for Computer Science, with sharp rises in cut-offs at Delhi, Madras, Kanpur and Kharagpur; OBC, EWS and SC ranksย ...
IIT Kharagpur, Singaporeโs IME Sign MoU for Semiconductor Research
The MoU establishes a framework for joint research in advanced designs, chip packaging, AI, quantum, photonic systems, and more.
World's Largest Student Cyber Security Contest Names Winners
The team 1064 Shellphish from the University of California (Santa Barbara) featured brothers Brandon and Andrew Dutcher. Andrew had competed inย ...
VC firm Bessemer Venture Partners appoints Pankaj Mitra as Partner in its India team
Bessemer Venture Partners, one of the oldest global venture capital firms, has onboarded industry veteran Pankaj Mitra as a Partner in its Indiaย ...
IIT Kharagpur wins award for cyber security education
IIT Kharagpur wins award for cyber security education ยท The award was given by the Data Security Council of India (a body set up in order toย ...

IITK Similar Companies

Abou Beker Belkaid University of TLEMCEN
Crรฉรฉe par dรฉcret Nยฐ 89-138 du 01 Aoรปt 1989 modifiรฉ et complรฉtรฉ par le dรฉcret exรฉcutif Nยฐ 95-205 du 05 Aoรปt 1995, puis modifiรฉ par le dรฉcret exรฉcutif Nยฐ 98-391 du 02 dรฉcembre 1998 lโUniversitรฉ Aboubekr Belkaid de Tlemcen est le fruit dโune longue รฉvolution. Lโenseignement supรฉrieur a dโabord รฉtรฉ ass

University of Wisconsin-Madison
In achievement and prestige, the University of WisconsinโMadison has long been recognized as one of America's great universities. A public, land-grant institution, UWโMadison offers a complete spectrum of liberal arts studies, professional programs and student activities. Spanning 936 acres along th

Northwestern University
Northwestern is one of the nationโs premier research universities, combining innovative teaching and pioneering research in a highly collaborative, multidisciplinary, and diverse environment. Northwestern provides both students and faculty exceptional opportunities for intellectual, personal, and pr

Bright Horizons UK
This is more than childcare. This is childhood. We have a network of over 300 Bright Horizons nurseries delivering exceptional care and education. In our nurseries, our teams practice our unique Nurture Approach; an evidence-based blend of holistic learning alongside support for childrenโรรดs emoti

The George Washington University
The George Washington University, an independent academic institution chartered by the Congress of the United States in 1821, dedicates itself to furthering human well-being. The University values a dynamic, student-focused community stimulated by cultural and intellectual diversity and built upon a

Central China Normal University
Central China Normal University Show more Show less

Frequently Asked Questions
Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
IITK CyberSecurity History Information
How many cyber incidents has IITK faced?
Total Incidents: According to Rankiteo, IITK has faced 1 incident in the past.
What types of cybersecurity incidents have occurred at IITK?
Incident Types: The types of cybersecurity incidents that have occurred incident Breach.
Incident Details
Can you provide details on each incident?

Incident : Data Breach
Title: Data Breach at Indian Institute of Technology Kharagpur
Description: Cryptolulz666 gained access to user data, including emails, passwords, phone numbers, and security questions, by breaking into the Indian Institute of Technology Kharagpur's database. The hacker claimed to have access to over 12,000 users' data, but he only disclosed a small percentage of it on Pastebin as evidence of the attack. The hacker draws attention to the companies' lax security once more. His goal is to make the authorities aware of this. Although there were around 12555 users in the database, the hacker only disclosed less than 25% of it because the organisation could face legal action for this information disclosure.
Type: Data Breach
Attack Vector: Database Intrusion
Threat Actor: Cryptolulz666
Motivation: Drawing attention to lax security and making authorities aware
What are the most common types of attacks the company has faced?
Common Attack Types: The most common types of attacks the company has faced is Breach.
Impact of the Incidents
What was the impact of each incident?

Incident : Data Breach IND253131123
Data Compromised: emails, passwords, phone numbers, security questions
What types of data are most commonly compromised in incidents?
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are emails, passwords, phone numbers and security questions.
Which entities were affected by each incident?

Incident : Data Breach IND253131123
Entity Type: Educational Institution
Industry: Education
Location: Kharagpur, India
Customers Affected: 12555
Data Breach Information
What type of data was compromised in each breach?

Incident : Data Breach IND253131123
Type of Data Compromised: emails, passwords, phone numbers, security questions
Number of Records Exposed: 12555
Personally Identifiable Information: True
Additional Questions
General Information
Who was the attacking group in the last incident?
Last Attacking Group: The attacking group in the last incident was an Cryptolulz666.
Impact of the Incidents
What was the most significant data compromised in an incident?
Most Significant Data Compromised: The most significant data compromised in an incident were emails, passwords, phone numbers and security questions.
Data Breach Information
What was the most sensitive data compromised in a breach?
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were emails, passwords, phone numbers and security questions.
What was the number of records exposed in the most significant breach?
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 180.0.
What Do We Measure?
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
These are some of the factors we use to calculate the overall score:
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.
