+91 701 0805032     krishiinet.noc@krishiinet.com

Krishii Fibernet


The public at large is hereby informed that:

  • Krishiinet does not recruit any 3rd party agencies to install any type of Tower.
  • All our connections are only on Fiber optics.
  • A mobile tower may be installed by either Telecom Service Provider (TSP) or Infrastructure Provider (IP-1) as per their licensing / registration conditions. The updated list of TSPs and IP-1 is available on DoT website i.e. www.dot.gov.in. The public at large are cautioned that before they entertain any offer for installation of tower, they should verify the authenticity of TSP/IP-1 from DoT website and the concerned TSP/IP-1.
  • In case any company / agency / individual is asking for advance or for application fee or for money in any form before actual installation of tower, public is hereby cautioned to be extra careful and verify the credentials of the company.
  • Any person or entity found fraudulently involved in such activity like i) taking advance etc., in the name of installation of mobile towers, ii) using name / logo / recommendations of Krishiinet Infocom Pvt. Ltd. is liable to be prosecuted under applicable law. If any person comes across any such fraudulent activity then he/she may report the incident to local police authorities. In addition or alternatively the local TERM Cell may also be contacted whose contact details are available on DoT website i.e. www.dot.gov.in.
  • Wannacry Ransomware Detection and Prevention advisories by CERT-In
  • CERT-In has issued an advisory on its website on 15 May 2017 (CERTIn Advisory CIAD20170024 Wannacry/ WannaCrypt Ransomware : CRITICAL ALERT Original Issue Date: May 13, 2017) for detection and prevention of this ransomware. The same has also been published on the Cyber Swachhta Kendra website today.
  • (http://www.cyberswachhtakendra.gov.in/alerts/wannacry_ransomware.html).
  • CERT-In has issued a vulnerability note on its website (CERTIn Vulnerability Note CIVN20170032 Multiple vulnerabilities in Windows SMB Original Issue Date: March 15, 2017) with a Severity Rating of HIGH on March 15, 2017 for possible remote exploitation of this vulnerability and to apply the patch released by Microsoft for the same. Missed calls alerts (Wangiri Calls):