Indian Institute of Technology, Kharagpur Company Cyber Security Posture

iitkgp.ac.in

On Sept. 15, 1956, the Parliament of India passed an act known as the Indian Institute of Technology(Kharagpur) Act declaring this Institute as an Institute of national importance. The Institute was also given the status of an autonomous University. From this modest start in 1950, IIT Kharagpur has been engaged in a steady process of development with about 27 academic departments and schools, 7 centres of excellence. the vast tree-laden campus, spreading over 2100 acres has a self contained township of over 15,000 inhabitants. Currently we have about 600 faculty, 1700 employees and 10000 students on the campus.

IITK Company Details

Linkedin ID:

indian-institute-of-technology-kharagpur

Employees number:

5409 employees

Number of followers:

248695.0

NAICS:

611

Industry Type:

Higher Education

Homepage:

iitkgp.ac.in

IP Addresses:

146

Company ID:

IND_1977746

Scan Status:

In-progress

AI scoreIITK Risk Score (AI oriented)

Between 900 and 1000

This score is AI-generated and less favored by cyber insurers, who prefer the TPRM score.

Ailogo

Indian Institute of Technology, Kharagpur Company Scoring based on AI Models

Model NameDateDescriptionCurrent Score DifferenceScore
AVERAGE-Industry03-12-2025

This score represents the average cybersecurity rating of companies already scanned within the same industry. It provides a benchmark to compare an individual company's security posture against its industry peers.

N/A

Between 900 and 1000

Indian Institute of Technology, Kharagpur Company Cyber Security News & History

Past Incidents
1
Attack Types
1
EntityTypeSeverityImpactSeenUrl IDDetailsView
Indian Institute of Technology, KharagpurBreach60312/2016IND253131123Link
Rankiteo Explanation :
Attack with significant impact with internal employee data leaks

Description: Cryptolulz666 gained access to user data, including emails, passwords, phone numbers, and security questions, by breaking into the Indian Institute of Technology Kharagpur's database. The hacker claimed to have access to over 12,000 users' data, but he only disclosed a small percentage of it on Pastebin as evidence of the attack. The hacker draws attention to the companies' lax security once more. His goal is to make the authorities aware of this. Although there were around 12555 users in the database, the hacker only disclosed less than 25% of it because the organisation could face legal action for this information disclosure.

Indian Institute of Technology, Kharagpur Company Subsidiaries

SubsidiaryImage

On Sept. 15, 1956, the Parliament of India passed an act known as the Indian Institute of Technology(Kharagpur) Act declaring this Institute as an Institute of national importance. The Institute was also given the status of an autonomous University. From this modest start in 1950, IIT Kharagpur has been engaged in a steady process of development with about 27 academic departments and schools, 7 centres of excellence. the vast tree-laden campus, spreading over 2100 acres has a self contained township of over 15,000 inhabitants. Currently we have about 600 faculty, 1700 employees and 10000 students on the campus.

Loading...

Access Data Using Our API

SubsidiaryImage

Get company history

curl -i -X GET 'https://api.rankiteo.com/underwriter-getcompany-history?linkedin_id=indian-institute-of-technology-kharagpur' -H 'apikey: YOUR_API_KEY_HERE'
newsone

IITK Cyber Security News

2025-04-06T07:00:00.000Z
Bessemer Venture Partners welcomes Pankaj Mitra as Partner

India's AI and tech landscape is undergoing a significant transformation across entrepreneurship and venture capital โ€” driven by governmentย ...

2025-01-27T08:00:00.000Z
Critical Intel Trust Domain Extensions Isolation Vulnerability Exposes Sensitive Data

Researchers from the IIT Kharagpur and Intel Corporation has uncovered a significant vulnerability in Intel's Trust Domain Extensions.

2025-06-20T07:00:00.000Z
IIT-Kharagpur graduate among 15 held in Telangana for circulating child abuse content; all repeat offende

Telangana Cyber Security Bureau arrested fifteen individuals for child sexual exploitation content. The accused were watching, storing,ย ...

2024-10-08T07:00:00.000Z
IIT Madras launches Cybersecurity Centre to boost Fundamental & Applied Research in India

Indian Institute of Technology Madras (IIT Madras) has launched a new cybersecurity centre to boost fundamental and applied research that drivesย ...

2024-10-08T07:00:00.000Z
IIT Madras Launches Cybersecurity Centre, Paving the Way for Research and Solutions

IIT Bombay closed at AIR 66 for Computer Science, with sharp rises in cut-offs at Delhi, Madras, Kanpur and Kharagpur; OBC, EWS and SC ranksย ...

2025-05-30T07:00:00.000Z
IIT Kharagpur, Singaporeโ€™s IME Sign MoU for Semiconductor Research

The MoU establishes a framework for joint research in advanced designs, chip packaging, AI, quantum, photonic systems, and more.

2016-11-14T08:00:00.000Z
World's Largest Student Cyber Security Contest Names Winners

The team 1064 Shellphish from the University of California (Santa Barbara) featured brothers Brandon and Andrew Dutcher. Andrew had competed inย ...

2025-06-04T07:00:00.000Z
VC firm Bessemer Venture Partners appoints Pankaj Mitra as Partner in its India team

Bessemer Venture Partners, one of the oldest global venture capital firms, has onboarded industry veteran Pankaj Mitra as a Partner in its Indiaย ...

2018-12-10T08:00:00.000Z
IIT Kharagpur wins award for cyber security education

IIT Kharagpur wins award for cyber security education ยท The award was given by the Data Security Council of India (a body set up in order toย ...

similarCompanies

IITK Similar Companies

Abou Beker Belkaid University of TLEMCEN

Crรฉรฉe par dรฉcret Nยฐ 89-138 du 01 Aoรปt 1989 modifiรฉ et complรฉtรฉ par le dรฉcret exรฉcutif Nยฐ 95-205 du 05 Aoรปt 1995, puis modifiรฉ par le dรฉcret exรฉcutif Nยฐ 98-391 du 02 dรฉcembre 1998 lโ€™Universitรฉ Aboubekr Belkaid de Tlemcen est le fruit dโ€™une longue รฉvolution. Lโ€™enseignement supรฉrieur a dโ€™abord รฉtรฉ ass

University of Wisconsin-Madison

In achievement and prestige, the University of Wisconsinโ€“Madison has long been recognized as one of America's great universities. A public, land-grant institution, UWโ€“Madison offers a complete spectrum of liberal arts studies, professional programs and student activities. Spanning 936 acres along th

Northwestern University

Northwestern is one of the nationโ€™s premier research universities, combining innovative teaching and pioneering research in a highly collaborative, multidisciplinary, and diverse environment. Northwestern provides both students and faculty exceptional opportunities for intellectual, personal, and pr

Bright Horizons UK

This is more than childcare. This is childhood. We have a network of over 300 Bright Horizons nurseries delivering exceptional care and education. In our nurseries, our teams practice our unique Nurture Approach; an evidence-based blend of holistic learning alongside support for childrenโ€šร„รดs emoti

The George Washington University

The George Washington University, an independent academic institution chartered by the Congress of the United States in 1821, dedicates itself to furthering human well-being. The University values a dynamic, student-focused community stimulated by cultural and intellectual diversity and built upon a

Central China Normal University

Central China Normal University Show more Show less

faq

Frequently Asked Questions

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.

IITK CyberSecurity History Information

How many cyber incidents has IITK faced?

Total Incidents: According to Rankiteo, IITK has faced 1 incident in the past.

What types of cybersecurity incidents have occurred at IITK?

Incident Types: The types of cybersecurity incidents that have occurred incident Breach.

Incident Details

Can you provide details on each incident?

Incident : Data Breach

Title: Data Breach at Indian Institute of Technology Kharagpur

Description: Cryptolulz666 gained access to user data, including emails, passwords, phone numbers, and security questions, by breaking into the Indian Institute of Technology Kharagpur's database. The hacker claimed to have access to over 12,000 users' data, but he only disclosed a small percentage of it on Pastebin as evidence of the attack. The hacker draws attention to the companies' lax security once more. His goal is to make the authorities aware of this. Although there were around 12555 users in the database, the hacker only disclosed less than 25% of it because the organisation could face legal action for this information disclosure.

Type: Data Breach

Attack Vector: Database Intrusion

Threat Actor: Cryptolulz666

Motivation: Drawing attention to lax security and making authorities aware

What are the most common types of attacks the company has faced?

Common Attack Types: The most common types of attacks the company has faced is Breach.

Impact of the Incidents

What was the impact of each incident?

Incident : Data Breach IND253131123

Data Compromised: emails, passwords, phone numbers, security questions

What types of data are most commonly compromised in incidents?

Commonly Compromised Data Types: The types of data most commonly compromised in incidents are emails, passwords, phone numbers and security questions.

Which entities were affected by each incident?

Incident : Data Breach IND253131123

Entity Type: Educational Institution

Industry: Education

Location: Kharagpur, India

Customers Affected: 12555

Data Breach Information

What type of data was compromised in each breach?

Incident : Data Breach IND253131123

Type of Data Compromised: emails, passwords, phone numbers, security questions

Number of Records Exposed: 12555

Personally Identifiable Information: True

Additional Questions

General Information

Who was the attacking group in the last incident?

Last Attacking Group: The attacking group in the last incident was an Cryptolulz666.

Impact of the Incidents

What was the most significant data compromised in an incident?

Most Significant Data Compromised: The most significant data compromised in an incident were emails, passwords, phone numbers and security questions.

Data Breach Information

What was the most sensitive data compromised in a breach?

Most Sensitive Data Compromised: The most sensitive data compromised in a breach were emails, passwords, phone numbers and security questions.

What was the number of records exposed in the most significant breach?

Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 180.0.

What Do We Measure?

revertimgrevertimgrevertimgrevertimg
Incident
revertimgrevertimgrevertimgrevertimg
Finding
revertimgrevertimgrevertimgrevertimg
Grade
revertimgrevertimgrevertimgrevertimg
Digital Assets

Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.

These are some of the factors we use to calculate the overall score:

Network Security

Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.

SBOM (Software Bill of Materials)

Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.

CMDB (Configuration Management Database)

Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.

Threat Intelligence

Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.

Top LeftTop RightBottom LeftBottom Right
Rankiteo is a unified scoring and risk platform that analyzes billions of signals weekly to help organizations gain faster, more actionable insights into emerging threats. Empowering teams to outpace adversaries and reduce exposure.
Users Love Us Badge