What's new

CHINESE HACKERS HACKED SECRET DATA OF INDIAN DEFENCE MINISTRY

Gryphon

SENIOR MEMBER
Joined
Jan 21, 2013
Messages
2,687
Reaction score
44
201331412338_samaa_tv.jpg


NEW DELHI: The official website of India’s Defence Research and Development Organisation (DRDO) has been breached by Chinese hackers, Indian reports said.

Reports said thousands of top secret files related to Cabinet Committee on Security have been stolen and posted on a server in China’s Guangdong province.

Apparently this the biggest security breach in the Indian defense establishment, until now.

The breach was reportedly discovered in the first week of this month, when officials from India’s technical intelligence wing, National Technical Research Organisation (NTRO), along with private Indian cyber security experts cracked open a file called “army cyber policy”.

The file was found attacked to hacked email accounts of senior DRDO officials that quickly spread through the system in a matter of seconds. NTRO found that the sensitive files stolen from the infected systems, were being uploaded on a server in Guangdong, China.

The stolen data contains information about surface-to-air missile and radar programmes. Some recovered files related to price negotiations with MBDA, a French missile manufacturing company.

Chinese hackers hacked secret data of Indian defence ministry | The News Informer
 
.
China Hackers Keenest On Industrial System Attacks – Trend Micro

China is the source of most attacks on Trend’s fake industrial systems

On March 15, 2013 by Tom Brewster 0
Chinese hackers are the keenest when it comes to hitting industrial control systems, research from a major security firm has indicated.

Industrial control systems help run nations’ critical infrastructure, and are increasingly coming under attack. The Stuxnet malware infamously targeted supervisory control and data acquisition (SCADA) networks in Iran, hitting a nuclear facility and setting back uranium enrichment processes.

For its study, Trend Micro set up three separate honeypots, which were designed to look like genuine industrial machines, connected to the public Internet. One was based on Amazon’s public cloud, another on a private Dell server, whilst the final one included an actual Programmable Logic Controller (PLC) controller, as used in such systems.

Trend tricks hackers

It took just 18 hours for attacks to occur on the fake SCADA set-ups. Over a 28-day period, the honeypots were attacked 39 times from 11 different countries. China accounted for the majority of the attack attempts at 35 percent, followed by the US on 19 percent. The UK accounted for eight percent.



“The findings concerning the deployments proved disturbing,” Trend said in its report, delivered during the Blackhat Europe conference in Amsterdam today.

“In addition to the many attacks seen on the honeypot environment, there was also a surprising number of malware exploitation attempts on the servers.

“Utilising the popular malware honeypot, Dionaea, four samples were collected over the testing time frame, two of which have not been seen in the wild as they had unique MD5 checksums.”

SCADA systems have been shown to be widely vulnerable over the last year. Research conducted by ICS-CERT recently discovered that in 2012 alone, 171 unique vulnerabilities affected 55 different ICS vendors.

It is easy to determine what SCADA systems are connected to the Internet. Tools such as Shodan can also help attackers figure out where vulnerable industrial controls are hooked up, whilst Pastebin contains lots of valuable information, such as relevant IP addresses

Trend had to contact a number of companies who had such systems attached to the Internet with no security mechanisms preventing unauthorised access.

“Until proper [industrial control system] security is implemented, these types of attack will likely become more prevalent and advanced or destructive in the coming years,” the security firm added.

The Chinese government has repeatedly been implicated as the culprit behind various attacks on US companies, including Facebook, Twitter and the New York Times. It has denied all accusations.

Yet it is only the US, which is thought to have been behind Stuxnet, that has been implicated in serious SCADA attacks with real-world, destructive consequences.

China Hackers Keenest On Industrial System Attacks
 
.
This is happening all over the world- not long ago Chinese hackers attacked Apple,Facebook and the US DOD. This is a regular occurance China employs tens of thousands of hackers.
 
.

GOOD PIC. can anyone tell me ,what is the place in the picture?
and what are the guys doing there?


WHO KNOWS?
 
.
Cyber security in Indian defence circles are pretty patetic. They are still depending on the old Signature based IDS/IPS systems to protect the networks where a whole world is moving towards signature less detection for any inturssion. We need to invest heavily on cyber security field.
 
.
So chinese hackers were the ones responsible for Nirbhay's failure...
They must have deleted important data :D
 
. . . .
GOOD PIC. can anyone tell me ,what is the place in the picture?
and what are the guys doing there?
LOL You know the answer, don´t you?
The pic just shows young Chinese playing online games. What else? cyber PLA officers?

:pop:
 
. .
LOL You know the answer, don´t you?
The pic just shows young Chinese playing online games. What else? cyber PLA officers?

:pop:
:omghaha: do you think dear Indian people will believe you???
 
.
The thief caught stealing, isn't the smartest one.

Given the tech level of "chinese hackers", it isn't surprising they get caught every now and then.
 
.
GOOD PIC. can anyone tell me ,what is the place in the picture?
and what are the guys doing there?


Looks like a chinese call-center.

The spacing is "dense-pack"... probably cost-cutting in force.

Ah.. the economy is bad. Understand.
 
.
already posted few days ago.and I already replied that they merely hacked DRDO's website,not DRDO's actual server,which is a high speed INTRANET,not Internet.
 
.

Latest posts

Country Latest Posts

Back
Top Bottom