‘Sophisticated’ Indian cyber attacks targeted Pak military sites

Discussion in 'Strategic Forces' started by Ganesh2691, May 21, 2013.

  1. Ganesh2691

    Ganesh2691 Regular Member

    Joined:
    Mar 4, 2012
    Messages:
    216
    Likes Received:
    297
    Cyber analysts in Norway have claimed that hackers based in India have been targeting government and military agencies in Pakistan for the last three years, extracting information of national security interest to India.
    The "sophisticated" attacks originated from an extensive, "non-state" cyberattack infrastructure, and used decoy links, including those that referred to this year's beheading incident on the Line of Control and rebel movements in the Northeast, as bait, according to a report released Monday by the Oslo-based Norman Shark group.

    The alleged cyberattack network — referred to as "Operation Hangover" in the report — was apparently unearthed as cyber analysts investigated an industrial espionage attack on the Norwegian telecom firm Telenor.

    The report has not identified the Pakistani agencies that were targeted, but has hinted that these included several sensitive military targets that would be of interest to India. The primary goal of the network seems to have been "surveillance against national security interests", says the report.

    The report says there is no evidence of "state sponsorship" for Operation Hangover. But it names several private Indian hacker groups, including those based in New Delhi, as being behind the attack.

    The hackers allegedly exploited vulnerabilities in software to plant Trojans in computers across the world, primarily in Pakistan, that then extracted information and sent it back over the Internet.

    There are no details yet on how much data might have been leaked, but the report claims that the network became active in 2010, peaked last year, and continues to be active currently.

    "Based on analysis of IP addresses collected from criminal data stores discovered during the investigation, it appears that potential victims have been targeted in over a dozen countries, most heavily represented by Pakistan, Iran, and the United States. Targets include government, military and civilian organisations," the report says.

    The Trojans planted by the network were inadvertently downloaded by users who viewed files or photographs pertaining to Indian military and rebel movements. A Pakistan government site was infected, for example, after a picture of soldiers praying near the Siachen glacier was downloaded, says the report.

    Another link that was allegedly used for infection was an article and satellite image of the Mendhar area on the Line of Control that saw heightened tension this year after the beheading of an Indian soldier by Pakistani army regulars.

    Other baits were related to rebel movements in Punjab and Nagaland.

    "The attackers went to great length to make the social engineering aspects of the attack appear as credible and applicable as possible," the report says.

    'Sophisticated' Indian cyberattacks targeted Pak military sites: Report - Indian Express
     
    aerokan, Illusive, aragorn and 2 others like this.
  2.  
  3. vram

    vram Regular Member

    Joined:
    Sep 25, 2011
    Messages:
    358
    Likes Received:
    451
    Location:
    Chennai
    LOL!! I love the way the name some 'NON STATE' actors in quotes. ROLF..... The grandest of ironies is that we are now using pakis favourite choice of words.
    Can we have more of the non state actors in all facades of our relationship with pakis please..
     
    sayareakd likes this.
  4. SilentKiller

    SilentKiller Regular Member

    Joined:
    Jan 20, 2013
    Messages:
    602
    Likes Received:
    224
    Location:
    India
    Great work, hitting enemy hard...
    search more on india pakis and get infected with trojans.....

    Anyway still guys always be very carefull of trojan, i worked on how to stop them.
    they are very harmful and easily available (code).

    most notorious one is Zeus.
     
    sayareakd likes this.
  5. vram

    vram Regular Member

    Joined:
    Sep 25, 2011
    Messages:
    358
    Likes Received:
    451
    Location:
    Chennai
    The modus operandi hear was not to use very sophisticated means but to rather use existing methods on a industrial scale. This was more of the usual excecutables sourcing a malware tactic can be easily avoided with some common sense. Only the greedy Pakis fell for it..
    Looks like "non state actors" :rofl: setup a proper project management team and following all the methodologies and processes used in traditional software development including module devs which is closely aligned to MVC and outsourcing. Seems a rather typical fingerprint of Indian companies.
     
    aerokan likes this.

Share This Page