'Computer networks of eastern command were compromised'

Discussion in 'Indian Navy' started by Oracle, Aug 8, 2012.

  1. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    Computer networks of the Eastern Naval Command were "probably compromised" after hacking attempts in 2011 and appropriate steps have been taken since then to strengthen it, Defence Minister A K Antony said on Wednesday.

    "There were intelligence reports in November, 2011 about probable compromise of computers of Eastern Naval Command based in Visakhapatnam [ Images ]," he told the Rajya Sabha.

    In written reply to the House, Antony said that hacking is a constant and real threat worldwide in the cyber domain.

    On steps taken to strengthen cyber system, he said, "The matter has been investigated and appropriate steps have been taken to strengthen security of network."

    The defence minister was replying to a question, "Whether Chinese hackers have succeeded in hacking the sensitive network of Eastern Naval Command and stealing intelligence inputs."

    In reply to a question on detection of Chinese spy vessels in territorial waters of the country recently, the minister denied any such development.

    Replying to a question on construction of border roads in Uttarakhand [ Images ], Antony said, "The Tanakpur-Tawaghat road having a length of 258.60 kms has been completed to single lane specification. Out of this, 256.72 km is being improved to double lane Specification by BRO."

    He further informed the House that 40 kms of road stretch is already completed and work on remaining portion is under various stages of progress, which is planned to be completed by 2019.

    The delays in completion of project were caused due to delay in land acquisition and forest clearance and difficulties in availability of construction materials, he said.

    Rediff
     
  2.  
  3. Kunal Biswas

    Kunal Biswas Member of the Year 2011 Moderator

    Joined:
    May 26, 2010
    Messages:
    27,616
    Likes Received:
    28,447
    Location:
    BHARAT, INDIA, HINDUSTHAN
    I dont get how these guys hack in isolated LANs..

    Unless there is insight person help Internet connectivity to one of the system..
     
  4. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    So you mean, there is no internet connectivity? To any of those systems?
     
    Last edited: Aug 8, 2012
    Kunal Biswas likes this.
  5. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    Stand alone LAN not connected to internet is hacked by the USB ports using external attachments like external hard disks.

    When those USB devices are any where connected to internet, the stored information or data is passed to host.
     
    The Messiah likes this.
  6. Kunal Biswas

    Kunal Biswas Member of the Year 2011 Moderator

    Joined:
    May 26, 2010
    Messages:
    27,616
    Likes Received:
    28,447
    Location:
    BHARAT, INDIA, HINDUSTHAN
    There is no serious danger from Out side hackers but Inside agents..
     
    Oracle likes this.
  7. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    Sometimes it could be agents but most of the time it is negligence and most of the time pen drive is the culprit. The other way is electronic monitoring of the computers but one needs to be within 300 to 400 metes away from the computer in line of sight with monitoring equipment.
     
  8. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    What rubbish?

    If a system, LAN, WAN or anything is not connected to the internet, it cannot be hacked, by external sources.

    If someone connects a zip drive, an external HDD, or any external memory to any system there - information automatically does not flow to those external memory drives. What is it? Liquid?

    Now, say an officer buys a pen drive, which hosts a hidden malware. He plugs the pen drive into his system at the Naval/Army/AF base and the anti-virus doesn't detect the malware. The malware, according to its code will either steal information and hid it in the pen drive, or will get itself attached to the host system (like a parasite) and try sending secret files through email. Since, the comp is not plugged into the internet, the malware will not be able to transmit files. If the malware hides secret files in the pen drive - and the officer say uses the pen drive on a system which has internet connectivity, information will flow out.

    Again, mischief can be done by internal people too. Say, someone using a pen drive to take out important files. Later, he goes to a cyber cafe and emails the docs.

    For information to pass from one source to another, there has to be a stream, which is provided by the internet.
     
    Last edited: Aug 8, 2012
    Kunal Biswas likes this.
  9. Kunal Biswas

    Kunal Biswas Member of the Year 2011 Moderator

    Joined:
    May 26, 2010
    Messages:
    27,616
    Likes Received:
    28,447
    Location:
    BHARAT, INDIA, HINDUSTHAN
    Da, You can connect your Lap to a unsecured LAN port in a switch, By accessing the switch in a isolated LAN you can hack into any computer say for Administrator computer where every document is kept, But one have to dispose that LAP after its use..

    This kind of sabotage happens if LAN security architecture is weak, And there are many cases like that..
     
  10. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    Unsecured LAN with no internet access right? If that is the case, yes, you are right. This is mostly done by mole's of other spy agencies as they have to be physically present and plug the laptop in the LAN. And Kunal, even if security architecture is weak, there should be logs in the server to pinpoint the exact port, the directory and hence the subsequent files being checked/copied, and the server ID and password used to gain access.

    Btw, I was actually talking about external security threats and the role of the internet in it. Seems we have more people inside harming us, than outside.
     
    Last edited: Aug 8, 2012
    Kunal Biswas likes this.
  11. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    Many electronic hardware manufactured in China comes with hidden malware. The Chinese scums are good when it comes to coding new generation malwares and spywares. They pass even Enterprise and hardware level checks. One reason why Armed Forces the world over see the Chinese with suspicion and never buy hardware from a Chinese company. Most malwares are to pass off military secrets to the thief of that cuntree.
     
  12. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    @ Oracle...

    that is how most of the chinese hacks have taken place..
    most of the pen drives are of chinese origin..
    there is a software in the driver which when connected to a computer searches for certain key words and stores that data undetected..
    The moment that pen drives gets connected to internet medium, may be even one year after, it would silently pass that data on to the host.

    My dear that is what Huwai does. The first thing a Huwai router will do is get connected to a server somewhere in Beijing or Taiwan..
     
  13. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    There is nothing like a software in the driver? Rest of your post is correct.

    But, Chinese are an external threat too. They continuously attack Govt. systems that are connected to the internet. This is one of the major reason, why most important government data are kept offline, in the old school kind of way.
     
    Last edited: Aug 8, 2012
  14. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    May be I am computer illiterate if drivers and unities are not software !
    Amy Lans are not on internet.
     
  15. Oracle

    Oracle New Member

    Joined:
    Mar 31, 2010
    Messages:
    8,120
    Likes Received:
    1,541
    Location:
    Bangalore, India
    You said - there is a software in the driver.

    There is a difference. You cannot use these terms so freely. When we say driver, we generally mean a device driver, which basically communicates with hardware. They are OS and hardware specific. Say for e.g, you cannot install a Windows XP Pro sound driver in a system using Solaris.

    I guess you know s/w.

    My post was not to offend you, but in giving out the actual details. Btw, how do you know Army systems are not connected to the internet?
     
  16. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    Because Army budgets for internet is abysmal...
     
  17. Daredevil

    Daredevil On Vacation! Administrator

    Joined:
    Apr 5, 2009
    Messages:
    11,613
    Likes Received:
    5,670
    I think Indian government system should shift to Linux operating system wholesale. The threat virus will be significantly reduced.
     
  18. Apollyon

    Apollyon Führer Senior Member

    Joined:
    Nov 13, 2011
    Messages:
    2,600
    Likes Received:
    2,380
    Location:
    आर्यावर्त
  19. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    Not possible or practcle
     
  20. mahesh

    mahesh Regular Member

    Joined:
    Sep 6, 2010
    Messages:
    379
    Likes Received:
    127
    Location:
    bangalore
    india have worlds greatest IT hub and all great companies are here.
    but our GOI is still in amateur technology . what a shame! when all your billions of money, time, hardwork and secrets are compromised silly ways of hacking (usb ports).
    and don't we have a hacking groups why can't they do the same to other countries ?
     
  21. Bhadra

    Bhadra Defence Professionals Defence Professionals Senior Member

    Joined:
    Jul 11, 2011
    Messages:
    6,687
    Likes Received:
    2,357
    Well if US computers in Afghanistan were hacked through USB ports, then you may consider someone's imagination that worked. Pen drives were found in scrap market in Peshawar contaianing US military confidential data. What more.

    By the way how does one transfers internet data on to a secure LAN? By USB... that plays the trick....
     
    Last edited: Aug 8, 2012

Share This Page