What's new

China hackers enter Navy computers, plant bug to extract sensitive data

arp2041

BANNED
Joined
Apr 4, 2012
Messages
10,406
Reaction score
-9
Country
India
Location
India
Hackers have broken into sensitive naval computer systems in and around Visakhapatnam, the headquarters of the Eastern Naval Command, and planted bugs that relayed confidential data to IP addresses in China.

The Eastern Naval Command plans operations and deployments in the South China Sea — the theatre of recent muscle-flexing by Beijing — and beyond. India’s first nuclear missile submarine, INS Arihant, is currently undergoing trials at the Command.

The extent of the loss is still being ascertained, and officials said it was “premature at this stage” to comment on the sensitivity of the compromised data. But the Navy has completed a Board of Inquiry (BoI) which is believed to have indicted at least six mid-level officers for procedural lapses that led to the security breach.

The naval computers were found infected with a virus that secretly collected and transmitted confidential files and documents to Chinese IP addresses. Strict disciplinary action against the indicted officers is imminent.

Responding to a questionnaire sent by The Sunday Express on whether highly classified data had been sent to IP addresses in China due to the bug, the Navy said: “An inquiry has been convened and findings of the report are awaited. It needs to be mentioned that there is a constant threat in the cyber domain from inimical hack ers worldwide.”

Sources, however, confirmed that classified data had been leaked, and the breach had possibly occurred because of the use of pen drives that are prohibited in naval offices. The virus was found hidden in the pen drives that were being used to transfer data from standalone computers to othersystems, said a person familiar with the investigation.

The Navy — and the other armed forces — stores sensitive data only in standalone computers that are not connected to the Internet. These computers are not supposed to have ports or access points for pen drives or external storage devices.

The virus apparently created a hidden folder and collected specific files and documents based on certain ‘key words’ that it has been programmed to identify.

The documents remained hidden on the pen drives until they were put in computers that were connected to the Internet, after which the bug quietly sent the files to specific IP addresses.

The cyber espionage came to light in January-February this year. Besides the Navy’s resources, other cyber forensic agencies were involved in tracing the hackers, sources said. China has been accused earlier of using “cyber battalions” — specially trained military staff — to break into sensitive computer systems across the world.

The Naval HQ in New Delhi is monitoring the case closely. Besides the Arihant trial, several other sensitive projects are being undertaken near Visakhapatnam, including an upcoming underground nuclear submarine base that is expected to house India’s strategic assets.

China hackers enter Navy computers, plant bug to extract sensitive data | idrw.org
 
.
I can only do LOL on our security.

They should have a network like NSA but that would take 100 years to develop.
 
.
I can only do LOL on our security.

They should have a network like NSA but that would take 100 years to develop.

This is not only the problem of India even US is dealing with this menace, China has decided to implement cyber warfare as a policy decision where they will target the sensitive information of every power in the world be it US, Russia, UK or India.
 
.
The only way to stop these cyber attacks is to counter attack them . Wonder how many Russian concepts they might have stolen :what:
 
. .
This is not only the problem of India even US is dealing with this menace, China has decided to implement cyber warfare as a policy decision where they will target the sensitive information of every power in the world be it US, Russia, UK or India.

In other countries, no such confidential documents are saved in those systems which have direct or indirect connection to internet. Single room has 3-4 systems having different respected networks. China steals information through human intelligence basically. If an American NSA system is hacked, it points to the honey trap for enemy hacker. But in India, what can I say now.
 
.
Its a very common trick, even in private companies like mine that the chinese deal with.
They tried giving me a pen drive as a souvenier but i told them my pc's usb port was blocked, but my boss got a trojan infection , which was detected by the anti-virus , from a new pen drive.

one of the reasons i boycotted using stuff by chinese companies...but unfortunately cant stop using made in china stuff...half the world is made there
 
. .
Why are such systems even online?

"The Navy — and the other armed forces — stores sensitive data only in standalone computers that are not connected to the Internet. These computers are not supposed to have ports or access points for pen drives or external storage devices.

The virus apparently created a hidden folder and collected specific files and documents based on certain ‘key words’ that it has been programmed to identify.

The documents remained hidden on the pen drives until they were put in computers that were connected to the Internet, after which the bug quietly sent the files to specific IP addresses."



At most The data already in the Closed network node might not have been compromised...only the data in the pen drives were collected and transmitted.
 
. .
Are you guys sure it was not American hackers who had the pleasure of breaking into Indian Navy computers?:woot:
 
.
^^
Chinese are notorious for there lousy spoofing.

IF they say they were Chinese ,u can dam well be sure they were Chinese.
 
.
Counter attack is the only way to check these kinda attacks. Build a strong cyber army :D
 
.
Counter attack is the only way to check these kinda attacks. Build a strong cyber army :D
Disagree with you there. We are not like the chinese, we respect ourselves and others. Rather than fight fire with fire, we should use water and defend ourselves from the hackers.
 
. .
Back
Top Bottom