What's new

Top Secret Indian Government documents sneaked into by Chinese hackers

you are right..a computer which is not connected to internet ,cant be hacked ..the only way to hack it is physically..and usually this kind of data is stored on a seperate secure systems...but if there are allegations then there must be some kind of loopholes in the security system of this data which might have made it vulnerable to attacks....remember these chinese hackers are always in a look out for this kind of sophisticated attacks by thousands of these semi skilled amateur attackers.....:pop:

BTW if you look at my previous post where I have mentioned the incidents of data hacked by Chines...you will see that in those cases the systems where connected to the network.:coffee:

TILL DATE CHINESE HACKERS ONLY HACKED THAT ARE CONNECTED TO WORLD WIDE WEB FULLY AGREED BUT THIS NEWS IS FAKE AS FAR AS HACKING OF MILITARY PROJECTS ISZ CONCERNED
 
.
LETS HAVE SOME COMMON SENSE THE ABOVE MENTIONED DATA WILL NOT BE STORED ON A PUBLIC SERVER. WHY DO EMBASSIES AROUND THE WORLD HAVE DEFENCE SYSTEMS DATA IN THEIR SERVERS. THE UNIVERSAL TRUTH ISZ THIS TYPE OF DATA WILL ONLY BE IN THE SERVERS OF DRDO AND MINISTRY OF DEFENCE WHICH MAINTAINS AN INDEPENDENT SERVER. IT HAS ITS OWN INTERNAL NETWORK SYSTEM AND THIS SERVER ISZ NEVER EVER CONNECTED TO WORLD WIDE WEB.IT ISZ LIMITED TO MINISTRY OF DEFENCE AND LABS OF DRDO THE WHOLE SERVER AND DATABASE ISZ BASED ON INDEPENDENT NETWORKING SYSTEM MY BROTHER WORKS IN DRDO AND HE LAUGHED AFTER SEEING THIS NEWS . AND FINALLY ITS NOT A PUBLIC SERVER FOR GOD SAKE

FINALLY THIS NEWS ISZ REDICULUS



:hitwall::hitwall::hitwall::hitwall:


Great Observation!

This article is not just self-contradictory BUT horrendously researched, really why would India keep its TOP-SECRET documents on Public serves above all in foreign embassies!:rofl:
 
.
NEW YORK: Major Indian missile and armament systems may have been compromised as Chinese hackers have reportedly broken into top secret files of the Indian Defence Ministry and embassies around the world.

Among the systems leaked out could be Shakti, the just introduced advanced artillery combat and control system of the Indian Army and the country's new mobile missile defence system called the Iron Dome.

A new report called 'Shadow in the Clouds' by Canadian and American researchers based at the University of Toronto has said that a spy operation called 'Shadow Network' based out of China has tapped into top secret files of the Indian government.

In the investigations conducted over eight months, the report claimed that systematic cyber espionage was carried out from servers located in China that "compromised" government, business, academic and other computer network systems in India.

The report finds that Indian government related entities, both in India and throughout the world, had been thoroughly compromised.

These included computers at Indian embassies in Belgium, Serbia, Germany, Italy, Kuwait, the United States, Zimbabwe, and the High Commissions of India in Cyprus and the United Kingdom.

"These include documents from the Offices of the Dalai Lama and agencies of the Indian national security establishment," the report said.

"Data containing sensitive information on citizens of numerous third-party countries, as well as personal, financial, and business information, were also exfiltrated and recovered during the course of the investigation," it said.

"Recovery and analysis of exfiltrated data, including one document that appears to be encrypted diplomatic correspondence, two documents marked "SECRET", six as "RESTRICTED", and five as "CONFIDENTIAL". These documents are identified as belonging to the Indian government," it added.

These documents contain sensitive information taken from a member of the National Security Council Secretariat concerning secret assessments of India's security situation in the states of Assam, Manipur, Nagaland and Tripura, as well as concerning the Naxalites and Maoists.

In addition, they contain confidential information taken from Indian embassies regarding India's international relations with and assessments of activities in West Africa, Russia/Commonwealth of Independent States and the Middle East, as well as visa applications, passport office circulars and diplomatic correspondence.

However, the researchers note that there is no direct evidence that these were stolen from Indian government computers and they may have been compromised as a result of being copied onto personal computers.

Recovered documents also included presentations relating to the following projects.Pechora Missile System - an anti-aircraft surface-to-air missile system, Iron Dome Missile System - a mobile missile defence system (Ratzlav-Katz 2010) and Project Shakti - an artillery combat command and control system (Frontier India 2009).

The report also finds that the spies also hacked into information on visa applications submitted to Indian diplomatic missions in Afghanistan.

This data was voluntarily provided to the Indian missions by nationals of 13 countries as part of the regular visa application process.

"In a context like Afghanistan, this finding points to the complex nature of the information security challenge where risks to individuals (or operational security) can occur as a result of a data compromise on secure systems operated by trusted partners," the report said.

The investigation also said that 1,500 letters sent from the Dalai Lama's office between January and November 2009, were also leaked out.

The researchers noted that while there was no clear insight into the motives of the spies, "the theme appears to involve topics that would likely be of interest to the Indian and Tibetan

Chinese agents hack into India's secret documents: Report - India - The Times of India

---------- Post added at 06:45 AM ---------- Previous post was at 06:45 AM ----------

A report published by a group of Canadian researchers today, reports Indian government, Tibetan government and media institutions to have suffered a massive computer penetration attack over the last eight months.

The report lists the Indian Embassy in the US, the Indian High Commission in the UK, National Informatics Center, New Delhi Railway Station, FICCI (Federation of Indian Chambers of Commerce and Industry) Air Force Station, Race Course, New Delhi and Vadodara, Institute for Defense Studies and Analysis and National Maritime Foundation, amongst others as penetrated.

Computers of media organizations like The Times of India, India Strategic and Force have also been reported to be compromised.

Classified, restricted and secret information has been stolen from the Indian armed forces as well as the Ministry of External Affairs and the Tibetan Government in Exile. This includes documentation related to the Pechora Missile System, the Israeli Iron Dome Missile Defense System as well as Project Shakti, an artillery command and control system.

India under massive hack attack | StratPost
 
. .
TRUST ME TIMES OF INDIA HAS BECOME SO RUBISH THAT THEY DONT DO ANY BACKGROUND RESEARCH BEFORE THEY PUBLISH


The following is submitted to your info as you calls Times of India rubbish:

1. Research is done by Canadian and United States computer security researchers.

2. Newspaper is New York Times not Times of India.


Link is given at the end.

Researchers Trace Data Theft to Intruders in China

By JOHN MARKOFF and DAVID BARBOZA
Published: April 5, 2010
TORONTO — Turning the tables on a China-based computer espionage gang, Canadian and United States computer security researchers have monitored a spying operation for the past eight months, observing while the intruders pilfered classified and restricted documents from the highest levels of the Indian Defense Ministry.

In a report issued Monday night, the researchers, based at the Munk School of Global Affairs at the University of Toronto, provide a detailed account of how a spy operation it called the Shadow Network systematically hacked into personal computers in government offices on several continents.

The Toronto spy hunters not only learned what kinds of material had been stolen, but were able to see some of the documents, including classified assessments about security in several Indian states, and confidential embassy documents about India’s relationships in West Africa, Russia and the Middle East. The intruders breached the systems of independent analysts, taking reports on several Indian missile systems. They also obtained a year’s worth of the Dalai Lama’s personal e-mail messages.

The intruders even stole documents related to the travel of NATO forces in Afghanistan, illustrating that even though the Indian government was the primary target of the attacks, one chink in computer security can leave many nations exposed.

“It’s not only that you’re only secure as the weakest link in your network,” said Rafal Rohozinski, a member of the Toronto team. “But in an interconnected world, you’re only as secure as the weakest link in the global chain of information.”

As recently as early March, the Indian communications minister, Sachin Pilot, told reporters that government networks had been attacked by China, but that “not one attempt has been successful.” But on March 24, the Toronto researchers said, they contacted intelligence officials in India and told them of the spy ring they had been tracking. They requested and were given instructions on how to dispose of the classified and restricted documents.

On Monday, Sitanshu Kar, a spokesman for the Indian Defense Ministry, said officials were “looking into” the report, but had no official statement.

The attacks look like the work of a criminal gang based in Sichuan Province, but as with all cyberattacks, it is easy to mask the true origin, the researchers said. Given the sophistication of the intruders and the targets of the operation, the researchers said, it is possible that the Chinese government approved of the spying.

When asked about the new report on Monday, a propaganda official in Sichuan’s capital, Chengdu, said “it’s ridiculous” to suggest that the Chinese government might have played a role. “The Chinese government considers hacking a cancer to the whole society,” said the official, Ye Lao. Tensions have risen between China and the United States this year after a statement by Google in January that it and dozens of other companies had been the victims of computer intrusions coming from China.

The spy operation appears to be different from the Internet intruders identified by Google and from a surveillance ring known as Ghostnet, also believed to be operating from China, which the Canadian researchers identified in March of last year. Ghostnet used computer servers based largely on the island of Hainan to steal documents from the Dalai Lama, the exiled Tibetan spiritual leader, and governments and corporations in more than 103 countries.

The Ghostnet investigation led the researchers to this second Internet spy operation, which is the subject of their new report, titled “Shadows in the Cloud: An investigation Into Cyberespionage 2.0.” The new report shows that the India-focused spy ring made extensive use of Internet services like Twitter, Google Groups, Blogspot, blog.com, Baidu Blogs and Yahoo! Mail to automate the control of computers once they had been infected.

The Canadian researchers cooperated in their investigation with a volunteer group of security experts in the United States at the Shadowserver Foundation, which focuses on Internet criminal activity.

“This would definitely rank in the sophisticated range,” said Steven Adair, a security research with the group. “While we don’t know exactly who’s behind it, we know they selected their targets with great care.”

By gaining access to the control servers used by the second cyber gang, the researchers observed the theft of a wide range of material, including classified documents from the Indian government and reports taken from Indian military analysts and corporations, as well as documents from agencies of the United Nations and other governments.

“We snuck around behind the backs of the attackers and picked their pockets,” said Ronald J. Deibert, a political scientist who is director of the Citizen Lab, a cybersecurity research group at the Munk School. “I’ve not seen anything remotely close to the depth and the sensitivity of the documents that we’ve recovered.”

The researchers said the second spy ring was more sophisticated and difficult to detect than the Ghostnet operation.

By examining a series of e-mail addresses, the investigators traced the attacks to hackers who appeared to be based in Chengdu, which is home to a large population from neighboring Tibet. Researchers believe that one hacker used the code name “lost33” and that he may have been affiliated with the city’s prestigious University of Electronic Science and Technology. The university publishes books on computer hacking and offers courses in “network attack and defense technology” and “information conflict technology,” according to its Web site.

Researchers Trace Data Theft to Intruders in China - NYTimes.com
 
.
The following is submitted to your info as you calls Times of India rubbish:

1. Research is done by Canadian and United States computer security researchers.

2. Newspaper is New York Times not Times of India.


Link is given at the end.

Researchers Trace Data Theft to Intruders in China

By JOHN MARKOFF and DAVID BARBOZA
Published: April 5, 2010


TORONTO — Turning the tables on a China-based computer espionage gang, Canadian and United States computer security researchers have monitored a spying operation for the past eight months, observing while the intruders pilfered classified and restricted documents from the highest levels of the Indian Defense Ministry.

In a report issued Monday night, the researchers, based at the Munk School of Global Affairs at the University of Toronto, provide a detailed account of how a spy operation it called the Shadow Network systematically hacked into personal computers in government offices on several continents.

The Toronto spy hunters not only learned what kinds of material had been stolen, but were able to see some of the documents, including classified assessments about security in several Indian states, and confidential embassy documents about India’s relationships in West Africa, Russia and the Middle East. The intruders breached the systems of independent analysts, taking reports on several Indian missile systems. They also obtained a year’s worth of the Dalai Lama’s personal e-mail messages.

The intruders even stole documents related to the travel of NATO forces in Afghanistan, illustrating that even though the Indian government was the primary target of the attacks, one chink in computer security can leave many nations exposed.

“It’s not only that you’re only secure as the weakest link in your network,” said Rafal Rohozinski, a member of the Toronto team. “But in an interconnected world, you’re only as secure as the weakest link in the global chain of information.”

As recently as early March, the Indian communications minister, Sachin Pilot, told reporters that government networks had been attacked by China, but that “not one attempt has been successful.” But on March 24, the Toronto researchers said, they contacted intelligence officials in India and told them of the spy ring they had been tracking. They requested and were given instructions on how to dispose of the classified and restricted documents.

On Monday, Sitanshu Kar, a spokesman for the Indian Defense Ministry, said officials were “looking into” the report, but had no official statement.

The attacks look like the work of a criminal gang based in Sichuan Province, but as with all cyberattacks, it is easy to mask the true origin, the researchers said. Given the sophistication of the intruders and the targets of the operation, the researchers said, it is possible that the Chinese government approved of the spying.

When asked about the new report on Monday, a propaganda official in Sichuan’s capital, Chengdu, said “it’s ridiculous” to suggest that the Chinese government might have played a role. “The Chinese government considers hacking a cancer to the whole society,” said the official, Ye Lao. Tensions have risen between China and the United States this year after a statement by Google in January that it and dozens of other companies had been the victims of computer intrusions coming from China.

The spy operation appears to be different from the Internet intruders identified by Google and from a surveillance ring known as Ghostnet, also believed to be operating from China, which the Canadian researchers identified in March of last year. Ghostnet used computer servers based largely on the island of Hainan to steal documents from the Dalai Lama, the exiled Tibetan spiritual leader, and governments and corporations in more than 103 countries.

The Ghostnet investigation led the researchers to this second Internet spy operation, which is the subject of their new report, titled “Shadows in the Cloud: An investigation Into Cyberespionage 2.0.” The new report shows that the India-focused spy ring made extensive use of Internet services like Twitter, Google Groups, Blogspot, blog.com, Baidu Blogs and Yahoo! Mail to automate the control of computers once they had been infected.

The Canadian researchers cooperated in their investigation with a volunteer group of security experts in the United States at the Shadowserver Foundation, which focuses on Internet criminal activity.

“This would definitely rank in the sophisticated range,” said Steven Adair, a security research with the group. “While we don’t know exactly who’s behind it, we know they selected their targets with great care.”

By gaining access to the control servers used by the second cyber gang, the researchers observed the theft of a wide range of material, including classified documents from the Indian government and reports taken from Indian military analysts and corporations, as well as documents from agencies of the United Nations and other governments.

“We snuck around behind the backs of the attackers and picked their pockets,” said Ronald J. Deibert, a political scientist who is director of the Citizen Lab, a cybersecurity research group at the Munk School. “I’ve not seen anything remotely close to the depth and the sensitivity of the documents that we’ve recovered.”

The researchers said the second spy ring was more sophisticated and difficult to detect than the Ghostnet operation.

By examining a series of e-mail addresses, the investigators traced the attacks to hackers who appeared to be based in Chengdu, which is home to a large population from neighboring Tibet. Researchers believe that one hacker used the code name “lost33” and that he may have been affiliated with the city’s prestigious University of Electronic Science and Technology. The university publishes books on computer hacking and offers courses in “network attack and defense technology” and “information conflict technology,” according to its Web site.

Researchers Trace Data Theft to Intruders in China - NYTimes.com

Chinese agents hack into India's secret documents: Report - India - The Times of India

then what isz this fox news :hitwall::hitwall::hitwall:
 
Last edited:
.
The following is submitted to your info as you calls Times of India rubbish:

1. Research is done by Canadian and United States computer security researchers.

2. Newspaper is New York Times not Times of India.


Link is given at the end.

Researchers Trace Data Theft to Intruders in China

By JOHN MARKOFF and DAVID BARBOZA
Published: April 5, 2010
TORONTO — Turning the tables on a China-based computer espionage gang, Canadian and United States computer security researchers have monitored a spying operation for the past eight months, observing while the intruders pilfered classified and restricted documents from the highest levels of the Indian Defense Ministry.

In a report issued Monday night, the researchers, based at the Munk School of Global Affairs at the University of Toronto, provide a detailed account of how a spy operation it called the Shadow Network systematically hacked into personal computers in government offices on several continents.

The Toronto spy hunters not only learned what kinds of material had been stolen, but were able to see some of the documents, including classified assessments about security in several Indian states, and confidential embassy documents about India’s relationships in West Africa, Russia and the Middle East. The intruders breached the systems of independent analysts, taking reports on several Indian missile systems. They also obtained a year’s worth of the Dalai Lama’s personal e-mail messages.

The intruders even stole documents related to the travel of NATO forces in Afghanistan, illustrating that even though the Indian government was the primary target of the attacks, one chink in computer security can leave many nations exposed.

“It’s not only that you’re only secure as the weakest link in your network,” said Rafal Rohozinski, a member of the Toronto team. “But in an interconnected world, you’re only as secure as the weakest link in the global chain of information.”

As recently as early March, the Indian communications minister, Sachin Pilot, told reporters that government networks had been attacked by China, but that “not one attempt has been successful.” But on March 24, the Toronto researchers said, they contacted intelligence officials in India and told them of the spy ring they had been tracking. They requested and were given instructions on how to dispose of the classified and restricted documents.

On Monday, Sitanshu Kar, a spokesman for the Indian Defense Ministry, said officials were “looking into” the report, but had no official statement.

The attacks look like the work of a criminal gang based in Sichuan Province, but as with all cyberattacks, it is easy to mask the true origin, the researchers said. Given the sophistication of the intruders and the targets of the operation, the researchers said, it is possible that the Chinese government approved of the spying.

When asked about the new report on Monday, a propaganda official in Sichuan’s capital, Chengdu, said “it’s ridiculous” to suggest that the Chinese government might have played a role. “The Chinese government considers hacking a cancer to the whole society,” said the official, Ye Lao. Tensions have risen between China and the United States this year after a statement by Google in January that it and dozens of other companies had been the victims of computer intrusions coming from China.

The spy operation appears to be different from the Internet intruders identified by Google and from a surveillance ring known as Ghostnet, also believed to be operating from China, which the Canadian researchers identified in March of last year. Ghostnet used computer servers based largely on the island of Hainan to steal documents from the Dalai Lama, the exiled Tibetan spiritual leader, and governments and corporations in more than 103 countries.

The Ghostnet investigation led the researchers to this second Internet spy operation, which is the subject of their new report, titled “Shadows in the Cloud: An investigation Into Cyberespionage 2.0.” The new report shows that the India-focused spy ring made extensive use of Internet services like Twitter, Google Groups, Blogspot, blog.com, Baidu Blogs and Yahoo! Mail to automate the control of computers once they had been infected.

The Canadian researchers cooperated in their investigation with a volunteer group of security experts in the United States at the Shadowserver Foundation, which focuses on Internet criminal activity.

“This would definitely rank in the sophisticated range,” said Steven Adair, a security research with the group. “While we don’t know exactly who’s behind it, we know they selected their targets with great care.”

By gaining access to the control servers used by the second cyber gang, the researchers observed the theft of a wide range of material, including classified documents from the Indian government and reports taken from Indian military analysts and corporations, as well as documents from agencies of the United Nations and other governments.

“We snuck around behind the backs of the attackers and picked their pockets,” said Ronald J. Deibert, a political scientist who is director of the Citizen Lab, a cybersecurity research group at the Munk School. “I’ve not seen anything remotely close to the depth and the sensitivity of the documents that we’ve recovered.”

The researchers said the second spy ring was more sophisticated and difficult to detect than the Ghostnet operation.

By examining a series of e-mail addresses, the investigators traced the attacks to hackers who appeared to be based in Chengdu, which is home to a large population from neighboring Tibet. Researchers believe that one hacker used the code name “lost33” and that he may have been affiliated with the city’s prestigious University of Electronic Science and Technology. The university publishes books on computer hacking and offers courses in “network attack and defense technology” and “information conflict technology,” according to its Web site.

Researchers Trace Data Theft to Intruders in China - NYTimes.com


indeed published by times of india

from an american news paper so thats what i said they should do some research before publishing bullshit

http://timesofindia.indiatimes.com/india/Chinese-agents-hack-into-Indias-secret-documents-Report/articleshow/5766129.cms
 
Last edited:
.

Its true that times Of India has reported this news but Justin Joseph is correct to say that the investigation was carried on by canadian and united States computer security researchers...and the information was then shared by the Indian officials....the news in Times Of India is no wrong either..

BTW - this is an Indian rport which matches with the New York times reort..

Researchers trace Indian Defence Ministry data theft to China
 
.
joseph sir i need some answer. a responsiable news paper like times of india or at least the editor should have some sence before copy pasting news from other news papers
 
.
Its true that times Of India has reported this news but Justin Joseph is correct to say that the investigation was carried on by canadian and united States computer security researchers...and the information was then shared by the Indian officials....the news in Times Of India is no wrong either..

BTW - this is an Indian rport which matches with the New York times reort..

Researchers trace Indian Defence Ministry data theft to China

agreed but this a usless news
 
. .
Tel Avivs main frames were once hacked by 2 Pakistani brothers.
Now this brins good(funny) memories.
 
.
Useless because you You still dont belive that the computers were hacked ??

like i said before i agree with you that the external affairs computers are hacked but not the computers containing the defence related information

! defence information will not be stored in the computers of external affairs ministry. \
research based information is stored in a secure server with no connection to out side network
 
.
i guess they have now the pension papers of military personal since technological datas are mostly in DRDO...
 
.
and buddy to be straight forward its another day another news


:blah::blah::blah::blah::blah:
 
.

Pakistan Defence Latest Posts

Pakistan Affairs Latest Posts

Back
Top Bottom