18.4 C
Athens
Σάββατο, 6 Δεκεμβρίου, 2025

Chinese state-sponsored hackers target Indian power grid assets in Ladakh

Περισσότερα Νέα

- Advertisement -

Chinese state-sponsored hackers had targeted India’s power grids in Ladakh possibly for information on India’s critical infrastructure or to prepare for sabotage in the future.

Chinese state-sponsored hackers had targeted India’s power grids in Ladakh possibly for information on India’s critical infrastructure or to prepare for sabotage in the future, according to the American cybersecurity firm Recorded Future.

This report, released earlier this month, details a campaign conducted by a likely Chinese state-sponsored threat activity group targeting the Indian power sector.

The activity was identified through a combination of large-scale automated network traffic analytics and expert analysis. According to the report, this targeting is likely a long-term strategic priority for select Chinese state-sponsored threat actors active within India.

The prolonged targeting of Indian power grid assets by Chinese state-linked groups offers limited economic espionage or traditional intelligence-gathering opportunities.

- Advertisement -

“We believe this targeting is instead likely intended to enable information-gathering surrounding critical infrastructure systems or is pre-positioning for future activity,” the report said.

The objective for intrusions may include gaining an increased understanding of these complex systems in order to facilitate capability development for future use or gaining sufficient access across the system in preparation for future contingency operations.

In February 2021, Recorded Future’s Insikt Group reported on intrusion activity targeting operational assets within India’s power grid that it attributed to a likely Chinese state-sponsored threat activity group.

Following a short lull after the publication of RedEcho reporting, the American firm detected ongoing targeting of Indian power grid organizations by China-linked adversaries, frequently using the privately shared modular backdoor ShadowPad. ShadowPad continues to be employed by an ever-increasing number of People’s Liberation Army (PLA) and Ministry of State Security (MSS)-linked groups, with its origins linked to known MSS contractors first using the tool in their own operations and later likely acting as a digital quartermaster.

In recent months, the American firm observed likely network intrusions targeting at least 7 Indian State Load Despatch Centres (SLDCs) responsible for carrying out real-time operations for grid control and electricity dispatch within these respective states.

Notably, this targeting has been geographically concentrated, with the identified SLDCs located in North India, in proximity to the disputed India-China border in Ladakh. One of these SLDCs was also targeted in previous RedEcho activity.

iccording to the report, this latest set of intrusions, however, is composed of an almost entirely different set of victim organizations. In addition to the targeting of power grid assets,

“To achieve this, the group likely compromised and co-opted internet-facing DVR/IP camera devices for command and control (C2) of Shadowpad malware infections, as well as use of the open source tool FastReverseProxy (FRP),” the report said.

Despite a partial troop disengagement between India and China from February 2021, the prolonged targeting of Indian critical infrastructure continues to raise concerns over pre-positioning activity being conducted by Chinese adversaries.

While this latest activity displays targeting and capability consistencies with previously identified RedEcho activity, there are also some notable distinctions, the report added.

- Advertisement -

ΑΠΑΝΤΗΣΤΕ

εισάγετε το σχόλιό σας!
παρακαλώ εισάγετε το όνομά σας εδώ

The reCAPTCHA verification period has expired. Please reload the page.

Ροή ειδήσεων

ΣΧΕΤΙΚΑ ΑΡΘΡΑ

Tawang hosts 4-day international conference on Tibetan spiritual leader Sixth Dalai Lama Gyalwa Tsangyang Gyatso

Arunachal Chief Minister Pema Khandu on Wednesday inaugurated the first ever International Conference on Gyalwa Tsangyang Gyatso, the Sixth Dalai Lama born here in...

Taiwan warns of growing Chinese digital espionage threat through popular apps

 Taiwan’s Ministry of Digital Affairs has sounded an alarm over the rising risks of Chinese surveillance through several popular apps, officially identifying Douyin, Xiaohongshu...

Fighting Abroad, Failing at Home: Pakistan’s Military Under Asim Munir Loses the Security Battle

A Pakistan Army convoy was ambushed on October 8 at Afghan border in Kurram district of Kohat division, resulting in killing of nine soldiers...

British MP Raises Baloch Women’s Abductions and Drone Use in Balochistan in British Parliament

The situation in Balochistan has been formally brought before the British Parliament, where Labour MP John McDonnell has raised concerns about recent human rights...

ΔΗΜΟΦΙΛΗ ΑΡΘΡΑ

Η Ταϊβάν προειδοποιεί για την αυξανόμενη απειλή ψηφιακής κατασκοπείας από την Κίνα μέσω δημοφιλών εφαρμογών

Το Υπουργείο Ψηφιακών Υποθέσεων της Ταϊβάν έχει σημάνει συναγερμό για τους αυξανόμενους κινδύνους της κινεζικής παρακολούθησης μέσω αρκετών δημοφιλών εφαρμογών, προσδιορίζοντας επίσημα τις Douyin,...

Το Tawang φιλοξενεί 4ήμερη διεθνή διάσκεψη για τον Θιβετιανό πνευματικό ηγέτη Δαλάι Λάμα Gyalwa Tsangyang Gyatso

Ο Πρωθυπουργός του Αρουνάτσαλ, Πέμα Χάντου, εγκαινίασε την Τετάρτη το πρώτο Διεθνές Συνέδριο για τον Γκιάλουα Τσανγκγιάνγκ Γκιάτσο, τον Έκτο Δαλάι Λάμα που γεννήθηκε...

Tawang hosts 4-day international conference on Tibetan spiritual leader Sixth Dalai Lama Gyalwa Tsangyang Gyatso

Arunachal Chief Minister Pema Khandu on Wednesday inaugurated the first ever International Conference on Gyalwa Tsangyang Gyatso, the Sixth Dalai Lama born here in...

Taiwan warns of growing Chinese digital espionage threat through popular apps

 Taiwan’s Ministry of Digital Affairs has sounded an alarm over the rising risks of Chinese surveillance through several popular apps, officially identifying Douyin, Xiaohongshu...