What's new

China Appears to Warn India: Push Too Hard and the Lights Could Go Out

Taimoor Khan

ELITE MEMBER
Joined
Jan 20, 2016
Messages
13,811
Reaction score
4
Country
Pakistan
Location
United Kingdom
China Appears to Warn India: Push Too Hard and the Lights Could Go Out - The New York Times (nytimes.com)




China Appears to Warn India: Push Too Hard and the Lights Could Go Out
As border skirmishing increased last year, malware began to flow into the Indian electric grid, a new study shows, and a blackout hit Mumbai. It now looks like a warning.




A woman and her daughter during the power outage in Mumbai, India, in October.

A woman and her daughter during the power outage in Mumbai, India, in October.Credit...Niharika Kulkarni/Reuters
David E. SangerEmily Schmall
By David E. Sanger and Emily Schmall
  • Feb. 28, 2021
阅读简体中文版閱讀繁體中文版
WASHINGTON — Early last summer, Chinese and Indian troops clashed in a surprise border battle in the remote Galwan Valley, bashing each other to death with rocks and clubs.
Four months later and more than 1,500 miles away in Mumbai, India, trains shut down and the stock market closed as the power went out in a city of 20 million people. Hospitals had to switch to emergency generators to keep ventilators running amid a coronavirus outbreak that was among India’s worst.
Now, a new study lends weight to the idea that those two events may well have been connected — as part of a broad Chinese cybercampaign against India’s power grid, timed to send a message that if India pressed its claims too hard, the lights could go out across the country.
The study shows that as the standoff continued in the Himalayas, taking at least two dozen lives, Chinese malware was flowing into the control systems that manage electric supply across India, along with a high-voltage transmission substation and a coal-fired power plant.




The flow of malware was pieced together by Recorded Future, a Somerville, Mass., company that studies the use of the internet by state actors. It found that most of the malware was never activated. And because Recorded Future could not get inside India’s power systems, it could not examine the details of the code itself, which was placed in strategic power-distribution systems across the country. While it has notified Indian authorities, so far they are not reporting what they have found.


Stuart Solomon, Recorded Future’s chief operating officer, said that the Chinese state-sponsored group, which the firm named Red Echo, “has been seen to systematically utilize advanced cyberintrusion techniques to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation and transmission infrastructure.”
The discovery raises the question about whether an outage that struck on Oct. 13 in Mumbai, one of the country’s busiest business hubs, was meant as a message from Beijing about what might happen if India pushed its border claims too vigorously.
News reports at the time quoted Indian officials as saying that the cause was a Chinese-origin cyberattack on a nearby electricity load-management center. Authorities began a formal investigation, which is due to report in the coming weeks. Since then, Indian officials have gone silent about the Chinese code, whether it set off the Mumbai blackout and the evidence provided to them by Recorded Future that many elements of the nation’s electric grid were the target of a sophisticated Chinese hacking effort.
It is possible the Indians are still searching for the code. But acknowledging its insertion, one former Indian diplomat noted, could complicate the diplomacy in recent days between China’s foreign minister, Wang Yi, and his Indian counterpart, Subrahmanyam Jaishankar, in an effort to ease the border tensions.https://www.nytimes.com/2021/02/26/...on=CompanionColumn&contentCollection=Trending
https://www.nytimes.com/2021/02/27/...on=CompanionColumn&contentCollection=Trending
https://www.nytimes.com/2021/02/23/...on=CompanionColumn&contentCollection=Trending


The investigators who wrote the Recorded Future study, said that “the alleged link between the outage and the discovery of the unspecified malware” in the system “remains unsubstantiated.” But they noted that “additional evidence suggested the coordinated targeting of the Indian load dispatch centers,” which balance the electrical demands across regions of the country.
The discovery is the latest example of how the conspicuous placement of malware in an adversary’s electric grid or other critical infrastructure has become the newest form of both aggression and deterrence — a warning that if things are pushed too far, millions could suffer.
“I think the signaling is being done” by China to indicate “that we can and we have the capability to do this in times of a crisis,” said retired Lt. Gen. D.S. Hooda, a cyberexpert who oversaw India’s borders with Pakistan and China. “It’s like sending a warning to India that this capability exists with us.”
Both India and China maintain medium-size nuclear arsenals, which have traditionally been seen as the ultimate deterrent. But neither side believes that the other would risk a nuclear exchange in response to bloody disputes over the Line of Actual Control, an ill-defined border demarcation where long-running disputes have escalated into deadly conflicts by increasingly nationalistic governments.
Cyberattacks give them another option — less devastating than a nuclear attack, but capable of giving a country a strategic and psychological edge. Russia was a pioneer in using this technique when it turned the power off twice in Ukraine several years ago.
And the United States has engaged in similar signaling. After the Department of Homeland Security announced publicly that the American power grid was littered with code inserted by Russian hackers, the United States put code into Russia’s grid in a warning to President Vladimir V. Putin.
Now the Biden administration is promising that within weeks it will respond to another intrusion — it will not yet call it an attack — from Russia, one that penetrated at least nine government agencies and more than 100 corporations.

So far, the evidence suggests that the SolarWinds hack, named for the company that made network-management software that was hijacked to insert the code, was chiefly about stealing information. But it also created the capability for far more destructive attacks — and among the companies that downloaded the Russian code were several American utilities. They maintain that the incursions were managed, and that there was no risk to their operations.
Until recent years, China’s focus had been on information theft. But Beijing has been increasingly active in placing code into infrastructure systems, knowing that when it is discovered, the fear of an attack can be as powerful a tool as an attack itself.
In the Indian case, Recorded Future sent its findings to India’s Computer Emergency Response Team, or CERT-In, a kind of investigative and early-warning agency most nations maintain to keep track of threats to critical infrastructure. Twice the center has acknowledged receipt of the information, but said nothing about whether it, too, found the code in the electric grid.
Repeated inquiries by The New York Times to the center and several of its officials over the past two weeks yielded no comment.
The Chinese government, which did not respond to questions about the code in the Indian grid, could argue that India started the cyberaggression. In India, a patchwork of state-backed hackers were caught using coronavirus-themed phishing emails to target Chinese organizations in Wuhan last February. A Chinese security company, 360 Security Technology, accused state-backed Indian hackers of targeting hospitals and medical research organizations with phishing emails, in an espionage campaign.
Four months later, as tensions rose between the two countries on the border, Chinese hackers unleashed a swarm of 40,300 hacking attempts on India’s technology and banking infrastructure in just five days. Some of the incursions were so-called denial-of-service attacks that knocked these systems offline; others were phishing attacks, according to the police in the Indian state of Maharashtra, home to Mumbai.
By December, security experts at the Cyber Peace Foundation, an Indian nonprofit that follows hacking efforts, reported a new wave of Chinese attacks, in which hackers sent phishing emails to Indians related to the Indian holidays in October and November. Researchers tied the attacks to domains registered in China’s Guangdong and Henan Provinces, to an organization called Fang Xiao Qing. The aim, the foundation said, was to obtain a beachhead in Indians’ devices, possibly for future attacks.

“One of the intentions seems to be power projection,” said Vineet Kumar, the president of the Cyber Peace Foundation.
The foundation has also documented a surge of malware directed at India’s power sector, from petroleum refineries to a nuclear power plant, since last year
. Because it is impossible for the foundation or Recorded Future to examine the code, it is unclear whether they are looking at the same attacks, but the timing is the same.
Yet except for the Mumbai blackout, the attacks have not disrupted the provision of energy, officials said.
And even there, officials have gone quiet after initially determining that the code was most likely Chinese. Yashasvi Yadav, a police official in charge of Maharashtra’s cyberintelligence unit, said authorities found “suspicious activity” that suggested the intervention of a state actor.
But Mr. Yadav declined to elaborate, saying the investigation’s full report would be released in early March. Nitin Raut, a state government minister quoted in local reports in November blaming sabotage for the Mumbai outage, did not respond to questions about the blackout.
Military experts in India have renewed calls for the government of Prime Minister Narendra Modi to replace the Chinese-made hardware for India’s power sector and its critical rail system.
“The issue is we still haven’t been able to get rid of our dependence on foreign hardware and foreign software,” General Hooda said.
Indian government authorities have said a review is underway of India’s information technology contracts, including with Chinese companies. But the reality is that ripping out existing infrastructure is expensive and difficult.
David E. Sanger reported from Washington, and Emily Schmall from New Delhi. Nicole Perlroth contributed reporting.

David E. Sanger is a White House and national security correspondent. In a 38-year reporting career for The Times, he has been on three teams that have won Pulitzer Prizes, most recently in 2017 for international reporting. His newest book is “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age.” @SangerNYTFacebook
Emily Schmall is a South Asia correspondent based in New Delhi. @emilyschmall
 
.
Lol.. another nonsense article from Nytimes.

I will not be surprised next time India any space mission failed. All it need to do is to blame China. And all their politician and scientist will be spare of all responsible for failure. While if the mission is success. These same shameless people will heap praise on their own mighty.
 
.
Lol.. another nonsense article from Nytimes.

You know what is funny? The sugardaddy (America) humiliating his sugarbaby (India) all over the world with this disclosure.

Read the article, even on this occasion, Indian establishment and state institutions are shit scared in naming China, just like their leader. :D
 
Last edited:
.
🤣 blaming terrible Indian electrical grid infrastructure on the Chinese.

When bad, usually deeply indebted, people want to start a war for profit or to provide a reason for massive price increases, they lie.
 
.
You know what it funny? The sugardaddy (America) humiliating his sugarbaby (India) all over the world with this disclosure.

Read the article, even on this occasion, Indian establishment and state institution are shit scared in naming China, just like their leader. :D
Now you know why modi won his re election even his era of government is such a failure. All he has to do , is to blame all failure on sabotage and China, Pakistan and then urge his citizen to rally behind him..

In this way, modi will never associate with failure. All his failure is becos of black magic cast on India by evil Chinese and Pakistanis. Such is the pathetic conclusion of Indian citizen who believe such absurd fantasy.

No wonder the shxtty chandrayaan 2 failed. Becos this group of delusion people never will work for success. All they do is pray for miracle to happened and if failed. All they do is to blame sabotage from China or Pakistan.

Chandrayaan 3 will end up failure too with this bunch of delusion people running such project under Modi.
 
Last edited:
.
Now you know why modi won his re election even his era of government is such a failure. All he has to do , is to blame all failure on sabotage and China, Pakistan and then urge his citizen to rally behind him..

In this way, modi will never associate with failure. All his failure is becos of black magic cast on India by evil Chinese and Pakistanis. Such is the pathetic conclusion of Indian citizen who believe such absurd fantasy.

No wonder the shxtty chandrayaan 2 failed. Becos this group of delusion people never will work for success. All they do is pray for miracle to happened and if failed. All they do is to blame sabotage from China or Pakistan.


Indeed.

But what I mentioned earlier, I am intrigued as to why India's master, America , is deliberately humiliating India by this disclosure. American media is the long arm of American deep state. Would China and Pakistan expose each other weakness all over public domain? Never.

On subject, If China indeed got such technology, please do share with us. :D
 
.
Dear Chinese please do this.

After that we will surely get rid of third class Chinese equipment from India.
Our government always works in a reactive manner so let close this once for all.

China should be banned in Telecom and Power related products.
 
.
More China threat from the once somewhat respected newspaper called the NY times now nothing but a
tabloid propaganda tool for the west. Any news organizations with self respect will not run such a story simply on conspiracy theories with out any prove or facts to back it up.

What's next? Blame China for lack of toilets in India? And the sad part is some Indians might actually believe these news.
 
.
China Appears to Warn India: Push Too Hard and the Lights Could Go Out - The New York Times (nytimes.com)




China Appears to Warn India: Push Too Hard and the Lights Could Go Out
As border skirmishing increased last year, malware began to flow into the Indian electric grid, a new study shows, and a blackout hit Mumbai. It now looks like a warning.




A woman and her daughter during the power outage in Mumbai, India, in October.

A woman and her daughter during the power outage in Mumbai, India, in October.Credit...Niharika Kulkarni/Reuters
David E. SangerEmily Schmall
By David E. Sanger and Emily Schmall
  • Feb. 28, 2021
阅读简体中文版閱讀繁體中文版
WASHINGTON — Early last summer, Chinese and Indian troops clashed in a surprise border battle in the remote Galwan Valley, bashing each other to death with rocks and clubs.
Four months later and more than 1,500 miles away in Mumbai, India, trains shut down and the stock market closed as the power went out in a city of 20 million people. Hospitals had to switch to emergency generators to keep ventilators running amid a coronavirus outbreak that was among India’s worst.
Now, a new study lends weight to the idea that those two events may well have been connected — as part of a broad Chinese cybercampaign against India’s power grid, timed to send a message that if India pressed its claims too hard, the lights could go out across the country.
The study shows that as the standoff continued in the Himalayas, taking at least two dozen lives, Chinese malware was flowing into the control systems that manage electric supply across India, along with a high-voltage transmission substation and a coal-fired power plant.




The flow of malware was pieced together by Recorded Future, a Somerville, Mass., company that studies the use of the internet by state actors. It found that most of the malware was never activated. And because Recorded Future could not get inside India’s power systems, it could not examine the details of the code itself, which was placed in strategic power-distribution systems across the country. While it has notified Indian authorities, so far they are not reporting what they have found.


Stuart Solomon, Recorded Future’s chief operating officer, said that the Chinese state-sponsored group, which the firm named Red Echo, “has been seen to systematically utilize advanced cyberintrusion techniques to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation and transmission infrastructure.”
The discovery raises the question about whether an outage that struck on Oct. 13 in Mumbai, one of the country’s busiest business hubs, was meant as a message from Beijing about what might happen if India pushed its border claims too vigorously.
News reports at the time quoted Indian officials as saying that the cause was a Chinese-origin cyberattack on a nearby electricity load-management center. Authorities began a formal investigation, which is due to report in the coming weeks. Since then, Indian officials have gone silent about the Chinese code, whether it set off the Mumbai blackout and the evidence provided to them by Recorded Future that many elements of the nation’s electric grid were the target of a sophisticated Chinese hacking effort.
It is possible the Indians are still searching for the code. But acknowledging its insertion, one former Indian diplomat noted, could complicate the diplomacy in recent days between China’s foreign minister, Wang Yi, and his Indian counterpart, Subrahmanyam Jaishankar, in an effort to ease the border tensions.https://www.nytimes.com/2021/02/26/...on=CompanionColumn&contentCollection=Trending
https://www.nytimes.com/2021/02/27/...on=CompanionColumn&contentCollection=Trending
https://www.nytimes.com/2021/02/23/...on=CompanionColumn&contentCollection=Trending


The investigators who wrote the Recorded Future study, said that “the alleged link between the outage and the discovery of the unspecified malware” in the system “remains unsubstantiated.” But they noted that “additional evidence suggested the coordinated targeting of the Indian load dispatch centers,” which balance the electrical demands across regions of the country.
The discovery is the latest example of how the conspicuous placement of malware in an adversary’s electric grid or other critical infrastructure has become the newest form of both aggression and deterrence — a warning that if things are pushed too far, millions could suffer.
“I think the signaling is being done” by China to indicate “that we can and we have the capability to do this in times of a crisis,” said retired Lt. Gen. D.S. Hooda, a cyberexpert who oversaw India’s borders with Pakistan and China. “It’s like sending a warning to India that this capability exists with us.”
Both India and China maintain medium-size nuclear arsenals, which have traditionally been seen as the ultimate deterrent. But neither side believes that the other would risk a nuclear exchange in response to bloody disputes over the Line of Actual Control, an ill-defined border demarcation where long-running disputes have escalated into deadly conflicts by increasingly nationalistic governments.
Cyberattacks give them another option — less devastating than a nuclear attack, but capable of giving a country a strategic and psychological edge. Russia was a pioneer in using this technique when it turned the power off twice in Ukraine several years ago.
And the United States has engaged in similar signaling. After the Department of Homeland Security announced publicly that the American power grid was littered with code inserted by Russian hackers, the United States put code into Russia’s grid in a warning to President Vladimir V. Putin.
Now the Biden administration is promising that within weeks it will respond to another intrusion — it will not yet call it an attack — from Russia, one that penetrated at least nine government agencies and more than 100 corporations.

So far, the evidence suggests that the SolarWinds hack, named for the company that made network-management software that was hijacked to insert the code, was chiefly about stealing information. But it also created the capability for far more destructive attacks — and among the companies that downloaded the Russian code were several American utilities. They maintain that the incursions were managed, and that there was no risk to their operations.
Until recent years, China’s focus had been on information theft. But Beijing has been increasingly active in placing code into infrastructure systems, knowing that when it is discovered, the fear of an attack can be as powerful a tool as an attack itself.
In the Indian case, Recorded Future sent its findings to India’s Computer Emergency Response Team, or CERT-In, a kind of investigative and early-warning agency most nations maintain to keep track of threats to critical infrastructure. Twice the center has acknowledged receipt of the information, but said nothing about whether it, too, found the code in the electric grid.
Repeated inquiries by The New York Times to the center and several of its officials over the past two weeks yielded no comment.
The Chinese government, which did not respond to questions about the code in the Indian grid, could argue that India started the cyberaggression. In India, a patchwork of state-backed hackers were caught using coronavirus-themed phishing emails to target Chinese organizations in Wuhan last February. A Chinese security company, 360 Security Technology, accused state-backed Indian hackers of targeting hospitals and medical research organizations with phishing emails, in an espionage campaign.
Four months later, as tensions rose between the two countries on the border, Chinese hackers unleashed a swarm of 40,300 hacking attempts on India’s technology and banking infrastructure in just five days. Some of the incursions were so-called denial-of-service attacks that knocked these systems offline; others were phishing attacks, according to the police in the Indian state of Maharashtra, home to Mumbai.
By December, security experts at the Cyber Peace Foundation, an Indian nonprofit that follows hacking efforts, reported a new wave of Chinese attacks, in which hackers sent phishing emails to Indians related to the Indian holidays in October and November. Researchers tied the attacks to domains registered in China’s Guangdong and Henan Provinces, to an organization called Fang Xiao Qing. The aim, the foundation said, was to obtain a beachhead in Indians’ devices, possibly for future attacks.

“One of the intentions seems to be power projection,” said Vineet Kumar, the president of the Cyber Peace Foundation.
The foundation has also documented a surge of malware directed at India’s power sector, from petroleum refineries to a nuclear power plant, since last year
. Because it is impossible for the foundation or Recorded Future to examine the code, it is unclear whether they are looking at the same attacks, but the timing is the same.
Yet except for the Mumbai blackout, the attacks have not disrupted the provision of energy, officials said.
And even there, officials have gone quiet after initially determining that the code was most likely Chinese. Yashasvi Yadav, a police official in charge of Maharashtra’s cyberintelligence unit, said authorities found “suspicious activity” that suggested the intervention of a state actor.
But Mr. Yadav declined to elaborate, saying the investigation’s full report would be released in early March. Nitin Raut, a state government minister quoted in local reports in November blaming sabotage for the Mumbai outage, did not respond to questions about the blackout.
Military experts in India have renewed calls for the government of Prime Minister Narendra Modi to replace the Chinese-made hardware for India’s power sector and its critical rail system.
“The issue is we still haven’t been able to get rid of our dependence on foreign hardware and foreign software,” General Hooda said.
Indian government authorities have said a review is underway of India’s information technology contracts, including with Chinese companies. But the reality is that ripping out existing infrastructure is expensive and difficult.
David E. Sanger reported from Washington, and Emily Schmall from New Delhi. Nicole Perlroth contributed reporting.

David E. Sanger is a White House and national security correspondent. In a 38-year reporting career for The Times, he has been on three teams that have won Pulitzer Prizes, most recently in 2017 for international reporting. His newest book is “The Perfect Weapon: War, Sabotage and Fear in the Cyber Age.” @SangerNYTFacebook
Emily Schmall is a South Asia correspondent based in New Delhi. @emilyschmall
Most of the Indian employees watch **** on their work so they got malware from watching bob n vgna.....don't blame Chinese just change your habits.
 
.
More China threat from the once somewhat respected newspaper called the NY times now nothing but a
tabloid propaganda tool for the west. Any news organizations with self respect will not run such a story simply on conspiracy theories with out any prove or facts to back it up.

What's next? Blame China for lack of toilets in India? And the sad part is some Indians might actually believe these news.

China blamed for c19. Blamed for anything wrong. No power in india blamed on China.
I surprised China not blamed by Pelosi for the attack on Capitol 🤣🤣🤣
India vaccine cannot work now blaming Chinese hackers 🖕🖕🖕💩💩💩🏔🐲


 
.
Dear Chinese please do this.

After that we will surely get rid of third class Chinese equipment from India.
Our government always works in a reactive manner so let close this once for all.

China should be banned in Telecom and Power related products.
Go ahead! You India will reduced to fourth world if u do that. :enjoy:

China is a superpower while India is just a small fry delude themselves as supapowa.
 
.
China blamed for c19. Blamed for anything wrong. No power in india blamed on China.
I surprised China not blamed by Pelosi for the attack on Capitol 🤣🤣🤣
India vaccine cannot work now blaming Chinese hackers 🖕🖕🖕💩💩💩🏔🐲



The Propaganda objective of this story the NY times tried to achieve is obviously aiming for smearing the
Chinese technology sector like the Chinese built 5G equipment can't be trusted to the other countries.

Even if you don't 100% believe the news, it will still make some countries out there paranoid about acquisition of Chinese technology and a seed of distrust with the Chinese equipment with any important infrastructures in the future. The U.S have been relentlessly pushing for this narrative to the rest of the world under the name national security since Trump.
 
.
Indeed.

But what I mentioned earlier, I am intrigued as to why India's master, America , is deliberately humiliating India by this disclosure. American media is the long arm of American deep state. Would China and Pakistan expose each other weakness all over public domain? Never.

On subject, If China indeed got such technology, please do share with us. :D
Simple, it's always a master and slave scenario. The US never treat India as an equal partner. They are obviously just tools for US global domination. The Indian are just short sighted people who will do US bidding with just small sweet talk. They never see the big picture. Slave will never rise above the master. It's good to keep the slave as tool while weak at the same time. :enjoy:

They are being make use which they never see thru it.
 
.
So effectively China govt controls the systems bought from China and can be remotely shut off.
This applies to all countries including all the western countries and east European companies and even Pakistan

So effectively China is confirming what Trump had been ranting about. Chinese 5g and power software is in the hands of the CCP and anyone not following Beijings diktats are likely to have their countries shut down.


This is excellent news and good to know . BUYERS BEWARE THE CCP IS WATCHING AND HAS A KILL SWITCH IN ITS HANDS

We must thank Taimoor Khan profusely for bringing this to the attention of all here .

We must publicise this as much as we can so everyone becomes aware of the consequences of buying Chinese.
 
Last edited:
.
So effectively China govt controls the systems bought from China and can be remotely shut off.
This applies to all countries including all the western countries and east European companies and even Pakistan

So effectively China is confirming what Trump had been ranting about. Chinese 5g and power software is in the hands of the CCP and anyone not following Beijings diktats are likely to have their countries shut down.


This is excellent news and good to know . BUYERS BEWARE THE CCP IS WATCHING AND HAS A KILL SWITCH IN ITS HANDS

We must thank Taimoor Khan profusely for bringing this to the attention of all here .

We must publicise this as much as we can so everyone becomes aware of the consequences of buying Chinese.
Go ahead. Better throw away the pc or smartphone u used to surf net which is made in China.

You are stupid , don't expect others to follow your foolishness. :enjoy:

You Indian will be remember as mother of all failure. :lol:
 
.

Pakistan Affairs Latest Posts

Back
Top Bottom