Sunday, August 9, 2015

Researchers Shares Details of Cyber-Terrorists Targetting Indian Government Officials

Cyber-Terrorism has provoked considerable alarm posed for potential threat which ranges from very narrow to very broad. Terrorists aims at gaining access to Nation's critical infrastructure involving both Government as well as Private sectors involved in cyber espionage and operations.


Nowadays, intensity of cyber attacks are rapidly increasing and extending into absolute cyber-war between states, which allowing terrorists organizations to pilfer data from financial and military organizations. Few months back, a similar incidents happened when a group of middle-east terrorists tried to infiltrate Indian Government official operational in cyber related divisions.

Which in response Independent Indian security researchers team planned a counter operation to track down the terrorist organization behind the cyber attack.

Shesh Sarangdhar, a security researcher at Seclabs & Systems Pvt. told The Hacker News that his team successfully penetrated the source computer (using zero-day exploits) used for spreading malware to Government officials and found that the attacker’s IP address belongs to Pakistan Telecommunication company limited.

“Upon Analysis, the infected system appeared be a part of an elaborately designed cyber operation center,” Mr. Sarangdhar explained.

Researchers found a directory called “Umer Media” on that compromised system, which contained Excel files maintaining a list of “multiple social media profiles of terrorism bent.”

“Excel file elaborately maintained the details of individuals who comment and like on these pages. Many of these social media profiles were later analyzed and revealed some key players behind the cyber-terror organization,” he told The Hacker News team.

The goal of cyber counter operation conducted by the Indian researchers was to prevent cyber attacks against any and all critical infrastructures.

Moreover, the researchers obtained mobile numbers of those key players and compromised their devices using a zero-day vulnerability in Maxthon browser.

“The mobile communication revealed that around 1000 mujahids were being trained to infiltrate Indian borders,” Mr. Sarangdhar told us.
Shesh Sarangdhar and his team will present the complete technical details of their operation, zero-day vulnerabilities used and the malware analysis at upcoming “1337Con” CyberSecurity Conference.

No comments:

Post a Comment