Recently, a Chinese state-sponsored hacker group, RedEcho has targeted the Indian power sector and critical infrastructure amid border tensions in an effort to implant malware. As the tension between the two most populous nations, India and China at the border worsened significantly.
But, after the series of large-scale automated network traffic analytics and analysis, the security experts were able to identify the activity.
According to the reports, the data sources comprise several security platforms, open-source tools, and techniques like Recorded Future Platform, SecurityTrails, Spur, and Farsight.
This report will lure the individuals who are involved in the strategic and operational intelligence activities associated with India and China.
Apart from this, the foreign minister of India, Subrahmanyam Jaishankar has declared on January 12, 2021, that the faith between India and China was significantly disturbed. But, here only the diplomacy and economic factors have countered a full-blown war between these two nations.
The security researchers at Recorded Future’s Insikt Group have perceived targeted intrusion activities of Chinese state-sponsored hacker groups against Indian organizations since early 2020 at a large scale.
Since mid-2020, the researcher of Recorded Future’s has unveiled a huge hype in the use of infrastructure which is tracked as AXIOMATICASYMPTOTE. And it embraces ShadowPad command and C2 servers through which the threat actors target India’s power sector and critical infrastructure.
The report clearly affirms that in this incident, the threat actors have targeted 10 different Indian power sector organizations and 2 Indian seaports.
The security researchers have identified a subset of these AXIOMATICASYMPTOTE servers which share common techniques, procedures, and infrastructure tactics that are already performed by the Chinese state-sponsored groups like APT41 and Tonto Team.
But, the Insikt Group believes that all these shreds of evidence are not enough to associate or blame this campaign to an existing public group. That’s why the security experts have concluded that they are investigating the whole matter closely.
You can follow us on Linkedin, Twitter, Facebook for daily Cyber security and hacking news updates.
Cross-strait tensions have escalated into a new domain as China and Taiwan engage in unprecedented…
The penetration testing community has received a significant upgrade with the release of Kali Linux…
Arsen, the cybersecurity startup known for defending organizations against social engineering threats, has announced the…
Despite sustained international pressure, sanctions, and public exposures over the past two years, the sophisticated…
Microsoft 365 users across Asia Pacific, Europe, the Middle East, and Africa are experiencing significant…
A sophisticated new attack method called "SmartAttack" that can breach supposedly secure air-gapped computer systems…