scorecardresearch
Thursday, March 28, 2024
Support Our Journalism
HomeIndiaSuspected Chinese hackers collected intelligence from country's grid near Ladakh, says report

Suspected Chinese hackers collected intelligence from country’s grid near Ladakh, says report

The hackers focused on at least 7 'load dispatch' centres that are responsible for carrying out real-time operations for grid control & electricity dispersal, a US intel firm reported.

Follow Us :
Text Size:

Singapore: Suspected state-sponsored Chinese hackers have targeted the power sector in India in recent months as part of an apparent cyber-espionage campaign, the threat intelligence firm Recorded Future Inc. said in a report published Wednesday.

The hackers focused on at least seven “load dispatch” centers in northern India that are responsible for carrying out real-time operations for grid control and electricity dispersal in the areas they are located, near the disputed India-China border in Ladakh, the report said. One of the load dispatch centers previously was the target of another hacking group, RedEcho, which Recorded Future has said shares “strong overlaps” with a hacking group that the U.S. has tied to the Chinese government.

“The prolonged targeting of Indian power grid assets by Chinese state-linked groups offers limited economic espionage or traditional intelligence gathering opportunities,” the Recorded Future report states. “We believe this is instead likely intended to enable information gathering surrounding critical infrastructure and/or pre-positioning for future activity.”

In addition, the hackers compromised an Indian national emergency response system and a subsidiary of a multinational logistics company, according to the report.

The hacking group, dubbed TAG-38, has used a kind of malicious software called ShadowPad, which was previously associated with China’s People’s Liberation Army and the Ministry of State Security, according to Recorded Future. Researchers didn’t identify the victims by name.

Jonathan Condra, a senior manager at Recorded Future, said the method the attackers used to make the intrusions — using compromised internet of things devices and cameras — was unusual. The devices used to launch the intrusions were based in South Korea and Taiwan, he said.

The Chinese Ministry for Foreign Affairs didn’t respond to a request for comment by press time. Beijing has consistently denied involvement in malicious cyber activity. Indian authorities also didn’t respond to a request for comment. –Bloomberg


Also read: Hacker says ‘flaw’ in Punjab govt power site left consumer data exposed. Firm says snag ‘fixed’


 

Subscribe to our channels on YouTube, Telegram & WhatsApp

Support Our Journalism

India needs fair, non-hyphenated and questioning journalism, packed with on-ground reporting. ThePrint – with exceptional reporters, columnists and editors – is doing just that.

Sustaining this needs support from wonderful readers like you.

Whether you live in India or overseas, you can take a paid subscription by clicking here.

Support Our Journalism

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular