How a warning about ShadowPad, Red Echo saved the national power grid from being hacked

New Delhi, Mar 02: CERT-In, India’s cyber security agency had in November detected ShadowPad malware, one of the largest supply chain attacks. The agency had alerted the national power grid operator and its regional units on November 19 about the malware and attempts being made to hack.

The National Critical Information Infrastructure Protection Centre had on February 12 warned about Red Echo, which is a Chinese state sponsored actor group. The warning stated that the group is trying to break into the grid control systems. It was further learnt that the IPs in Red Echo and ShadowPad instances matched, following which list of the IPs and domains were sent out. 

Read more

Banking trojan Cerberus, the new headache for cyber security officials

cybersecurityNew Delhi, May 20: The Central Bureau of Investigation has issued a nationwide alert on the banking trojan Cerberus. The CBI said that this tricks the smartphone users into downloading a malicious link relating to COVID-19.

The advisory was issued by the CBI, following an input from the Interpol. The trojan presents itself as an update related to COVID-19. The trojan primarily focuses on stealing financial data such as credit card numbers. It can use overlay attacks to trick victims into providing personal information and can capture two-factor authentication details, the agency also said.

Read more

India’s cyber security challenge: It is time to protect the great firewall

cybersecurityConsidering how large cyber security threat is, there is a dire need to show urgency and tackle the problem and counter such threats

The threats today are contemporary and new. The marriage between the internet and crime and terror has led to various security agencies stating that the future would be all about fighting cybercrime.

The latest WhatsApp breach is a clear indicator of how serious the threat is. Several persons were targeted for surveillance, using Israeli spyware Pegasus via WhatsApp. The government has demanded strict action and even sought an explanation from WhatsApp. Although WhatsApp stated that it had warned India about the same, the agencies said that it was vague.

Read more

How Chennai’s BOSS is protecting Indian Army against espionage

army-modernBOSS or Bharat Operating System Solutions will now guard the Indian Army’s communication and information networks. The new software was developed after Prime Minister Narendra Modi pushed for enhancing cyber security.

The Indian Army is currently testing the software which will guard against espionage. Currently the Northern Command has been evaluating BOSS at its headquarters. This would replace the foreign solutions and provide more security.

The software has been developed by the CDAC Chennai and the new software is extremely crucial for the Indian Army.

Read more

Cochin, Trivandrum airport websites hacked by Kashmir Cheetah, restored

hasck-28-1482894742Thiruvananthapuram, Dec 28: The websites of the Cochin and Thiruvananthapuram airports which were hacked on Wednesday morning have been restored.
Cyber security officials who were investigating the matter have managed to restore the sites briefly after they were hacked by a group called Kashmir Cheetah.
A message on the websites read, Mess with the Best read a message from a group called the Pakistan Cyber Attackers. The message on the websites read ‘website stamped by Kashmiri Cheetah’.

Read more

Internet terror: Here is what the NCCC will do

cybersecurityThe National Cyber Coordination Centre will finally start its operations by the end of this year. With an allocation of Rs 800 crore, the NCCC is expected to step up cyber security in India which has become a major threat over the past couple of years.
The project has been pending since 2013 and the fact that it has finally got the nod is a good step in ensuring that India’s cyber security is up to the mark.

Read more

Cyber policy- broad, lofty and no safeguards


The much awaited National Cyber Security Policy of 2013 was revealed yesterday and this according to the government of India was done with an intention of safeguarding the nation.
Before getting into the pros and cons of the policy here is a brief of what the policy aims at doing. A nodal agency to coordinate all matters related to cyber security would be set up.
A mechanism to share information, identify and respond to cyber security incidents would be in place. A cyber ecosystem would be created to provide fiscal benefits to businesses. A workforce comprising 5,00,000
professionals would be appointed. The policy aims at enhancing and also creating a national and sectoral level 24×7 mechanisms for obtaining
strategic information regarding threats. It plans to develop indigenous security technologies through research. Continue reading “Cyber policy- broad, lofty and no safeguards”

Private players in cyber security- Advantages only


There was always a big question mark over India’s handling of Cyber Security. India was considered to be ill-equipped and slow when it came down to tracking cyber crimes and now with the world waking up to this threat, it was time that even India did something.

The Government of India in association with the private sector has decided to undertake a five year programme in which nearly 5 lakh personnel would be trained to help India fight a cyber war. Many experts feel that it was time that the private sector was roped in to fight this battle as the number of cases appear to be going up each day and the detection rate has been more than pathetic.

Continue reading “Private players in cyber security- Advantages only”

The importance of ethical hacking

Pic: Outlook

In the past 12 months at least 42 million Indians were hit by cyber crimes and the recorded loss of the same was a staggering 8 billion dollar loss. In such an event and while conducting an estimate, it becomes clear that in order to stem this rot, India needs at least 4 lakh more ethical hackers.
Mohan Gandhi, who passed out of IIM Ahmedabad provides anti piracy solutions through his company Entersoft Information Systems. In this interview with, Gandhi speaks about the challenges while dealing with cyber security and also what it is to be an ethical hacker.

Continue reading “The importance of ethical hacking”

Social network- The IM is here now

Photo courtesy:

When the Indian Mujahideen orchestrated the recent spate of attacks across India, investigators took a while before they could figure out the modus operandi. Post 13/7 and the Delhi High Court blasts, what foxed investigators was the complete absence of telephone conversations that led up to the planning and the execution of these blasts.

Today the investigators are able to make some sense out of this and have realized that it was the social networking sites that were being used to communicate between the cadres. In addition to this, the police have also found that some cadres of the Indian Mujahideen were trying to conduct recruitment’s through their Facebook accounts through hidden messages.

The Indian Mujahideen has been quick in the use in the use of technology when it came to planning and executing their operations. They started out with the use of emails, then moved on to chats and later Skype through which they communicated. However when the police finally got wind of this, they improvised by using the drafts in a mail and also the cache to store their messages in accounts which was accessed through a common username and password.

Planning:Yasin Bhatkal who today is the big boy in the Indian Mujahideen had extensively used social networking sites to stay in touch with his fellow men in the outfit. Personalized messages were sent out and also status updates in coded forms were used to communicate his plans which eventually led to two very horrific blasts. According to the police the use of social networking commenced in the year 2008 itself, but then it was sparingly used at that time. They had a back up plan on hand and had decided on using social networking more extensively only if their other forms of communication failed.

However post 2008 there was very strict monitoring of the manner in which the IM cadres communicated amongst each other through emails and also phones which prompted them to use social networking sites extensively. The first use of social networking in a major way was visible during the Varanasi blasts. The accused who had fled India for Dubai orchestrated the Varanasi blasts through the use of social networking sites. The messages were simple and heavily coded language had been used to pass on information. It was at that time that the IM was looking to rebuild and they were content with smaller attacks just to keep the ball rolling and announce that they were not out of contention. Hence by intentionally maintaining a low profile and using very little man force they managed to carry out the Varanasi blasts.

The same was witnessed during the 13/7 and also the Delhi blasts. During the run up to these attacks, the IM cadres in India met directly and discussed their plans. They did realize that one on one meetings left very little trail. They then used these networking sites to communicate with their other counterparts who were in different locations. All this went unnoticed by the police which helped them execute their plans with a great deal of ease.

Shishir Gupta, the author of the book- Indian Mujahideen, Tracking the Enemy Within says. “ for an aspiring global power, India is very vulnerable to cyber attacks by terrorist groups. Since 2005 IM modules have been communicating through cyber space with the use of emails, Skype etc. Hence when we speak of the use of social networking sites, it is only natural that they would have upgraded their capabilities. With the option of mobile phones and also satellite phones out it was expected that they would use such sites to communicate. This in fact has proven to be a safe method of communication for them.

The Danger ahead: While now it is clear that the IM has been using social networking sites to communicate, there is also this danger where the recruitment’s are concerned. It is not necessary that they would continue to use very popular networking sites to communicate their plans amongst each other. The police are not ruling out a possibility of the use of lesser known sites for communication.

However the bigger worry ahead is the manner in which they would try and recruit and also communicate their agenda through such sites. The IM has been trying to fashion itself on the lines of the Lashkar-e-Tayiba and has been quoting some social causes before they carry out their attacks. They are constantly looking for sympathy amongst the younger lot and have been successful to a large extent.

During the past couple of months it has been witnessed that some members of the outfit who are present on popular social networking sites have been sending out friend requests to college students, persons in high positions and also journalists. While they would snoop on some profiles the requests sent out to college students is nothing but a bait. Once the friend request is sent out, there are messages that are posted regarding the kind of news that is appearing against their community and also discussions regarding the various issues such as Godhra or a Babri are discussed thus dishing out sentiments. The success rate has not been all that great according to the police, but even they manage to bait one out of 20 people, the IM would be content.

Cyber security experts say that there is no one point solution to this problem. The cyber police need to constantly watch popular sites and also the activity over the internet. There is no point in finding out things after the damage has been done and it is necessary that the police remain one up on the game.