February 20, 2025, began like any other day. But by the end of it, the digital landscape of Nepal’s government was shaken. Two critical government websites – dls.gov.np (Department of Livestock Services) and mohp.gov.np (Ministry of Health and Population) – had been targeted in a brazen cyberattack.
dls.gov.np
Incident details: https://www.zone-h.org/mirror/id/41323773
Defaced page: https://zonehmirrors.org/defaced/2025/02/20/dls.gov.np/dls.gov.np/
While the Department of Livestock Services managed to recover its site swiftly, the Ministry of Health and Population’s portal remained down, its homepage defaced and sensitive data exposed, including emails and potentially other confidential records. This was not just a technical glitch – it was a stark reminder of the vulnerabilities that plague even the highest levels of governance.
mohp.gov.np – the attack on mohp.gov.np was first reported at 18:55, when the hacker – identifying as CaptainSmok3r – publicized details of the breach in an online channel. The hacker left a link to this channel embedded in the defaced government website, revealing their intent to expose vulnerabilities. As of this article’s update at 23.20, the Ministry of Health and Population’s portal remains offline, its homepage defaced and sensitive data exposed, including emails and potentially confidential health records. The outage lasting for over 4 hours highlights the severity of the breach and complexity of the recovery effort.





The hackers left their mark not just on the websites but on public trust. Imagine the chaos: citizens seeking health updates or livestock farmers relying on government advisories were met with error messages or distorted pages. Worse, the breach of mohp.gov.np raised alarms about the exposure of personal data – what if there were sensitive health data or some private email communications? The consequences of those can be serious.
But this is not an isolated incident. As experts scramble to understand the attack vectors, and resolve this case on the short term; whispers circulate about other government websites quietly exposing sensitive details on the public interface. While specifics are not revealed on this article to protect these sites, the reality is clear: many digital platforms remain dangerously exposed and need immediate action.
Why now?
Cyberattacks on government systems are not new and not just limited to Nepal. In 2023 alone, U.S. federal agencies reported 32,211 security incidents, with 11 classified as “major,” ranging from ransomware attacks to phishing exploits. Yet, the Nepal hacks today feels different. They strike at the heart of public services – livestock management and healthcare – sectors critical to daily life (even if Nepal does not proactively use their web services on the government level yet). The hackers didn’t just deface a homepage; they infiltrated systems meant to safeguard lives and livelihoods.
The exposure of emails and data risks identity theft, financial fraud, or even blackmail. This isn’t about lines of code; it’s about real people left vulnerable.
A call to action
The time for complacency is over. Governments worldwide, including Nepal, must adopt a zero-tolerance approach to cybersecurity. Here’s how:
- Prioritize Multi-Factor Authentication (MFA): Simple yet effective, MFA adds layers of security to prevent unauthorized access. Imagine a hacker with a stolen password – MFA would block them cold and at least delay the inflation process – providing the security team to prevent unintended harm.
- Regular Vulnerability Audits: Treat cybersecurity like a health check-up. Routine scans can identify weaknesses before attackers exploit them.
- Invest in AI-Driven Threat Detection: Artificial intelligence can predict and neutralize threats in real time, a critical tool as attackers grow more sophisticated.
- Train Employees: Human error remains the weakest link. Regular workshops on phishing, password hygiene, and data handling can prevent breaches.
- Adopt Zero-Trust Architecture: Assume no user is safe, even inside the network. Verify every access request to minimize insider risks.
- Secure Legacy Systems: Outdated software is low-hanging fruit for hackers. Upgrading or replacing legacy systems is non-negotiable.
The road ahead
The Nepal hacks are a wake-up call. As quantum computing and AI reshape cyber threats, governments must future-proof their defenses. But this isn’t just about technology – it’s about mindset. Cybersecurity is not an IT department’s burden; it’s a crucial aspect for leadership.
Imagine a world where government websites are digital fortresses, where data is encrypted, and citizens trust that their information is safe. That future is possible, but it requires action today. Let February 20, 2025, be remembered not as a day of crisis but as the turning point when governments finally took cybersecurity seriously.
The choice is ours. Will we wait for the next breach, or will we build a safer digital tomorrow?


