The New York on Sunday reported that a study by US internet security firm, found
Chinese malware "was flowing into the control systems that manage electric supply across India, along with a high-voltage transmission substation and a coal-fired power plant" at the time of the Ladakh standoff.
Recorded Future monitors state-sponsored cyber activity.
The cybersecurity company says it has sent its findings to
Indian Computer Emergency Response Team (or CERT-ln) within the Ministry of Electronics and Information Technology of the Government of India.
It adds that the government has acknowledged the æceipt twice, though there has been no confirmation of the fact that the code infected in the power grid may have any links with China-based hackers.
In its report, Recorder Future alleged that it also observed the suspected Indian state-sponsored group Sidewinder target Chinese military and government entities in 2020, in activity overlapping with recent
Trend Micro research.
The allegedly Indian state-sponsored group Dropping
Elephant has been known to target the Chinese government via spearphishing and watering hole attacks.
The Indian military has invested in cyber operations to get ahead of its adversaries.
Its cyber forces by establishing the
(DCA), a new tri-service agency for cyber warfare.
The DCA is said to have more than 1,000 experts who will be distributed into a number of formations in the Army, Navy, and Air Force.
The highly active cyber-espionage entity known as SideWinder has been plaguing governments and enterprises since 2012.
A recently released report by AT&T Alien Labs shows most of SideWinder's activity is heavily focused on South Asia and East Asia, with the group likely supporting Indian political interests.
Recorded Future said that in the lead-up to the May 2020 border skirmishes, it observed a noticeable increase in the provisioning of
PtugX malware C2 infrastructure. much of which was subsequently used in intrusion activity targeting Indian organisations.
The PlugX activity included the targeting of multiple Indian government. public sector and defence organisations from at least May 2020. it said.
While not unique to Chinese cyber espionage activity, PtugX has been heavily used by China-nexus groups for many years.
Comments