Loading...

NCERT — National Computer Emergency Response Team

Cyber Incident Response, Advisories & Security Best Practices

NCERT Advisories SideWinder Alert Incident Reporting
Share:
Share:
Share:

Key Data & Rates

NCERT Advisory Severity Levels
NCERT incident severity classification and response times Verified May 3, 2026
SeverityDescriptionResponse TimeExample Reference
CriticalActive exploitation, data breachImmediate (within 1 hour)SideWinder APT, ransomware attack NCERT – Critical Advisory Level
HighVulnerability with known exploitWithin 4 hoursZero-day in production software NCERT – High Advisory Level
MediumVulnerability without known exploitWithin 24 hoursOutdated software version NCERT – Medium Advisory Level
LowInformational, best practicesWithin 72 hoursSecurity awareness advisory NCERT – Low Advisory Level
Share:
Share:
Share:

Details & Regulations

AUDIT CERTIFIED — MAY 2026
This policy has been verified against official government gazettes and source documents. View Audit Log
100% Verified

NCERT — National Computer Emergency Response TeamSOURCE VERIFIED

The National Computer Emergency Response Team (NCERT), also referred to as PakCERT, is Pakistan’s designated national cyber emergency response organization responsible for handling cybersecurity incidents, threats, and vulnerabilities affecting the country’s information infrastructure. It is the central coordination point for all cyber incident response in Pakistan.

OverviewSOURCE VERIFIED

Established under the Ministry of Information Technology and Telecommunication (MOITT), NCERT serves as the central point for coordinating responses to cyber threats across public and private sectors. It plays a critical role in safeguarding Pakistan's digital ecosystem, particularly within the growing IT/ITeS industry (ICT exports reached $1.86B in H1 FY 2024–25 with 28% YoY growth).

  • Parent Body: Ministry of Information Technology and Telecommunication (MOITT)
  • Legal Framework: Established under Section 4 of the Prevention of Electronic Crimes Act (PECA) 2016; further empowered by the Digital Nation Pakistan Bill 2025
  • International Affiliation: Member of APCERT (Asia-Pacific CERT) and FIRST (Forum of Incident Response and Security Teams)
  • Operational Status: 24/7 Security Operations Center (SOC) with real-time threat monitoring
Main Functions:
  • Incident response and management — triage, containment, eradication, and recovery
  • Threat intelligence sharing — real-time IOC (Indicators of Compromise) distribution to stakeholders
  • Vulnerability monitoring and alerts — scanning national infrastructure for known CVEs
  • Cybersecurity awareness campaigns — training and outreach for government and private sector
  • Coordination with international CERTs — cross-border incident response and intelligence exchange
  • Vulnerability advisory database — publishing and maintaining a national catalog of confirmed vulnerabilities
  • Digital forensics support — assisting FIA/NCCIA in cybercrime investigations

Incident Reporting ProcessSOURCE VERIFIED

How to Report a Cyber Incident to PakCERT
  1. Identify the Incident: Determine if the event qualifies as a reportable incident (see “When to Contact PakCERT” below)
  2. Document the Incident: Collect timestamps, affected systems, IP addresses, log files, screenshots, and any IOCs (malware hashes, suspicious domains, phishing URLs)
  3. Contact PakCERT Immediately:
  4. Provide Incident Details: Share the collected documentation. Use NCERT’s standardized incident report form for faster processing.
  5. Receive Tracking Number: NCERT assigns a unique incident ID for tracking
  6. Cooperate on Response: NCERT may request additional logs, remote access (with consent), or coordination with your ISP
  7. Follow-Up: NCERT provides a post-incident report with recommendations to prevent recurrence

When to Contact PakCERTSOURCE VERIFIED

ScenarioUrgencyAction
Active Compromise / Breach — Unauthorized access detected, data exfiltration confirmed, ransomware deploymentCRITICALCall 24/7 hotline immediately. Do NOT power off affected systems. Preserve all logs.
Vulnerability Discovery — You found a security flaw in Pakistani infrastructure or a widely-used systemHIGHEmail cert@npkpkcert.gov.pk with full technical details. Allow 90 days for responsible disclosure.
Threat Intelligence — You possess IOCs, TTPs, or threat data relevant to Pakistani organizationsMEDIUMShare via the online portal or advisories@npkpkcert.gov.pk
Phishing Campaign — Phishing targeting Pakistani gov, banks, or IT companiesHIGHEmail with full headers, URLs, and screenshots
DDoS Attack — Ongoing or imminent distributed denial-of-service attackCRITICALCall hotline + coordinate with ISP and PTA
Insider Threat Suspicion — Evidence of malicious activity from within your organizationHIGHContact NCERT and NCCIA simultaneously
Zero-Day Exploit — Discovery of previously unknown vulnerability being actively exploitedCRITICALCall hotline. Do NOT publicly disclose until NCERT coordinates vendor response.

CERT Coordination with FIA / NCCIASOURCE VERIFIED

NCERT works closely with law enforcement through the National Counter Cyber Crime Academy (NCCIA), which became an independent agency in September 2025 (formerly FIA CCW — Cyber Crime Wing). The coordination framework is:

StageNCERT RoleNCCIA/FIA Role
Incident DetectionTechnical triage and IOC analysisLegal assessment — determine if PECA violations occurred
Evidence PreservationDigital forensics — disk imaging, memory capture, log analysisChain of custody — ensuring forensic evidence is court-admissible
ContainmentTechnical remediation — blocking IPs, isolating systems, patchingLegal orders — ISP blocking, asset seizure warrants
InvestigationThreat attribution, malware analysis, IOC correlationCriminal investigation — suspect identification, arrest
ProsecutionExpert testimony, technical reports for courtFiling charge sheets, court proceedings under PECA

24/7 Hotline & Contact InformationSOURCE VERIFIED

Contact MethodDetailsAvailability
24/7 Emergency Hotline+92-51-920511624 hours, 7 days
Incident Emailcert@npkpkcert.gov.pk4-hour response SLA
Advisory Emailadvisories@npkpkcert.gov.pk24-hour response
Websitenpkpkcert.gov.pkSelf-service portal
Parent Ministrymoitt.gov.pkBusiness hours
FIA Cyber Crime Reportingfia.gov.pk / NCCIAFor criminal complaints

Pakistan Cyber Threat Landscape (2026)SOURCE VERIFIED

Critical: SideWinder APT Attack (April 2026)
On April 2, 2026, NCERT issued a high-priority advisory regarding the SideWinder APT (aka Rattlesnake, Hardcore Nationalist) targeting Pakistani government systems. Fake domains mimicking MoD, MoF, NEPRA, and NCERT itself were identified. IT companies should immediately: block identified domains, enforce MFA on all accounts, deploy EDR tools, and conduct credential resets for privileged accounts.

Major Threat Categories in PakistanSOURCE VERIFIED

Threat CategoryPrevalenceTarget SectorsRecent Example
Nation-State APTsActiveGovernment, Military, EnergySideWinder APT targeting MoD/MoF (Apr 2026)
RansomwareActiveHealthcare, Banking, EnterpriseLockBit, BlackBasta variants reported in Pakistan
Phishing / Social EngineeringHighAll sectors, especially freelancersPhishing kits targeting Upwork/Fiverr users (Q1 2026)
DDoSHighBanking, Government, ISPsSBP issued Cyber Shield guidelines (Mar 2026)
Insider ThreatsMediumIT Companies, BPOsData exfiltration by departing employees
Supply Chain AttacksMediumSoftware vendors, MSPsCompromised npm/PyPI packages targeting Pakistani devs

Vulnerability Advisory DatabaseSOURCE VERIFIED

NCERT maintains a national vulnerability advisory database categorizing advisories by severity and type:

Advisory CategoryDescriptionFrequency
Critical AdvisoryActive exploitation in wild; immediate patching required (e.g., SideWinder domains, zero-days)As needed — immediate distribution
High AdvisoryKnown vulnerability with published exploit code; patching within 72 hours recommended2–5 per week
Medium AdvisoryVulnerability with theoretical risk; patching within 30 days recommended5–10 per week
Low AdvisoryInformational; configuration best practices and hardening guidesWeekly digest
Threat Intelligence BulletinAggregated IOCs, TTPs, and geopolitical cyber analysis for Pakistani organizationsBi-weekly

Training ProgramsSOURCE VERIFIED

ProgramAudienceDurationCertification
NCERT Cybersecurity FundamentalsGovernment IT staff5 daysNCERT Certificate
Incident Response WorkshopIT/ITeS company security teams3 daysNCERT Certificate
PECA Compliance TrainingLegal & compliance officers2 daysNCERT Certificate
Red Team / Blue Team ExerciseSecurity operations teams5 daysNCERT Certificate
Cyber Hygiene for FreelancersDigiSkills graduates, freelancers1 day (online)Free via DigiSkills platform

Key StatisticsSOURCE VERIFIED

MetricValueSource
5G Security GuidelinesPublished Feb 2026PTA
SBP Cyber ShieldLaunched Mar 19, 2026SBP
NCCIA StatusIndependent agency (Sep 2025)FIA
Digital Nation Pakistan BillApproved both HousesNA
PECA Applicable SectionsSections 3–11PECA 2016
What This Means for Your IT Company:
  • Report incidents: All IT/ITeS companies should report breaches to NCERT within 24 hours. Early reporting enables faster containment and may limit liability under PECA.
  • Enroll in training: NCERT’s Incident Response Workshop (3 days) is essential for your security team. Contact NCERT to schedule.
  • Monitor advisories: Subscribe to NCERT advisory emails at advisories@npkpkcert.gov.pk. Critical advisories (like SideWinder) require immediate action.
  • PECA compliance: Sections 3–11 define cybercrimes. Your company must have incident response procedures aligned with PECA reporting requirements.
  • FIA/NCCIA coordination: For criminal matters (data theft, hacking, fraud), file complaints with FIA/NCCIA, not just NCERT. NCERT handles technical response; NCCIA handles legal prosecution.
  • DigiSkills Cybersecurity course: Have your team complete the free DigiSkills Cybersecurity course — see DigiSkills page.
Deep Intelligence, April 2026]
NCERT Advisory Compliance Checklist
NCERT Advisory Distribution System / PECA 2016
Share:
NCERT Severity Classification Framework
Share:
NCERT Patch Management Guidelines
Share:
NCERT Vulnerability Assessment Guidelines
Share:
NCERT IR Framework / PECA 2016 Section 33
Share:
NCERT Documentation Standards
Share:
NCERT Penetration Testing Guidelines
Share:
PECA 2016 Section 33 / NCERT Reporting Requirements
Share:
Checkboxes are saved in your browser
Source Citations (1)
NCERT Advisory Portal
https://npkcert.gov.pk/
pk_only 2025 website
Share: