Govt wakes up to hacking threats

Home minister says govt is looking carefully into the matter after reports of Chinese hackers leaking sensitive information surfaces

PTI | April 8, 2010



Government is "very carefully" looking into reports of hacking of sensitive data at the National Security Council,  Secretariat and other key ministries by some Chinese computer network.

Investigations have suggested that computers in the secretariat were infected which made them vulnerable to Chinese hackers who managed to access sensitive documents.

"There are reports. We are looking into it very carefully," Home Minister P Chidamabaram said.

According to a Canadian firm SecDev Group, which investigated the hacking of the Dalai Lama's computer in late 2008, as many as 12 computers of NIC had been affected by activities of Chinese hackers.

The investigation report said the GhostNet system directs the infected computers to download a Trojan, known as ghost RAT, which allows attackers to gain complete, real-time control. The ghost RAT is consistently controlled from commercial internet access accounts located on the island of Hainan in China.

The report surprised the government as it mentioned that computers in nine Indian Missions abroad which included key countries like the US and the UK had been penetrated by the Chinese hackers.

An email message arrives in the target's inbox carrying the malware in an attachment or web link. The attackers' objective is to get the target to open the attachment or malicious link so that the malicious code can be executed, it said.

"Our investigation reveals that GhostNet is capable of taking full control of infected computers, including searching and downloading specific files, and covertly operating attached devices, including microphones and web cameras."

"China is actively developing an operational capacity in cyberspace, correctly identifying it as the domain in which it can achieve strategic parity, if not superiority, over the military establishments of the United States and its allies."

"Chinese cyber warfare doctrine is well developed, and significant resources have been invested by the People's Liberation Army and security services in developing defensive and offensive capabilities," the report said.

The report said that at least 14 documents, including two marked secret, were stolen from NSCS computers. "The exfiltrated documents focus on India's security situation in the states of Assam, Manipur, Nagaland and Tripura as well as the Naxalites, Maoists, and what is referred to as 'left wing extremism'," the report said.
 

Comments

 

Other News

Mofussils: Musings from the Margins

Provincials: Postcards from the Peripheries By Sumana Roy Aleph Book Company, 320 pages, Rs 899 Sumana Roy’s latest work, like its p

How to promote local participation in knowledge sharing

Knowledge is a powerful weapon to help people and improve their lives. Knowledge provides the tools to understand society, solve problems, and empower people to overcome challenges and experience personal growth. Limited sources were available to attain information on the events in and arou

‘The Civil Servant and Super Cop: Modesty, Security and the State in Punjab’

Punjabi Centuries: Tracing Histories of Punjab Edited by Anshu Malhotra Orient BlackSwan, 404 pages, Rs. 2,150

What really happened in ‘The Scam That Shook a Nation’?

The Scam That Shook a Nation By Prakash Patra and Rasheed Kidwai HarperCollins, 276 pages, Rs 399 The 1970s were a

Report of India’s G20 Task Force on Digital Public Infrastructure released

The final ‘Report of India’s G20 Task Force on Digital Public Infrastructure’ by ‘India’s G20 Task Force on Digital Public Infrastructure for Economic Transformation, Financial Inclusion and Development’ was released in New Delhi on Monday. The Task Force was led by the

How the Great War of Mahabharata was actually a world war

Mahabharata: A World War By Gaurang Damani Sanganak Prakashan, 317 pages, Rs 300 Gaurang Damani, a Mumbai-based el

Visionary Talk: Amitabh Gupta, Pune Police Commissioner with Kailashnath Adhikari, MD, Governance Now


Archives

Current Issue

Opinion

Facebook Twitter Google Plus Linkedin Subscribe Newsletter

Twitter