MUMBAI: A leading Indian infrastructure company<\/a> recently discovered to its dismay that its IT systems<\/a> were compromised, with hackers gaining remote access to some of the most sensitive information for a fairly long period of time.
\n
While no official complaint has been made by the company, the attack might just be proverbial tip of the iceberg, and cyber-security experts engaged by the firm say
Chinese hackers<\/a> were behind the breach. Several Indian companies<\/a> and some government institutions<\/a> have seen an increase in cyber attacks<\/a> originating in China, say industry trackers.
\n
Like in the case of the infrastructure company, these attacks are often carried out through difficult to-trace
proxy servers<\/a> in North Korea, Africa, Eastern Europe and Russia. Unlike a normal attack, the Chinese breaches tend to exploit vulnerabilities of Indian IT systems and \"just observe.”
\n
\n
\n
\n<\/p>

\n\t\n\t\t\n\t\t\t
\n\t\t\t\t\"\"<\/td>\n\t\t<\/tr>\n\t<\/tbody>\n<\/table><\/div> “Often, cyber attacks originating from neighbouring countries are relayed through VPN<\/a> and proxy servers in eastern Europe, Africa, North Korea and Russia. These attacks are very sophisticated, well planned and targeted toward specific sectors and companies,” said Amit Jaju, partner of EY’s forensic technology & discovery services.
\n
\nExperts say some of the sectors, including India’s defence industries, may be vulnerable against such attacks. Often, many Indian companies and government institutions aren't even aware of the hack unless they rope in a cyber expert to conduct an investigation. They also lack proper operating procedures, such as examining employees of defence or public sector units.
\n
\n“While China, Pakistan and Iran have dedicated teams of cyber hackers (with immunity), it would be difficult to pinpoint in today’s world where the cyber-attack emanated from. All the modern machines – aircraft, warships, tanks and cars – run on cyber technology.
\n
\nThe power generation and distribution grids, banking as well as oil and communication industries are the most vulnerable today against potential attacks,” said D Sivanandhan, former Director General of Police, Maharashtra.
\n
\nSome experts believe that Chinese hackers may even use social media platforms, such as Facebook, to create, change and manipulate opinions of Indians just as they do domestically.
\n
\n“The fear is not only that hackers would obtain information illegally or access defence data but also that they may manipulate public opinion....through a targeted propaganda over social media and other modes of mass communication,” said Tushar Ajinkya, Partner, DSK Legal.
\n\n<\/body>","next_sibling":[{"msid":59964405,"title":"Demonetisation, GST, JioPhone make a dent in smartphone shipments growth projection","entity_type":"ARTICLE","link":"\/news\/demonetisation-gst-and-jiophones-make-a-dent-in-smartphone-shipments-growth-projection\/59964405","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":59964435,"entity_type":"ARTICLE","title":"Chinese hackers step up attacks on Indian shores","synopsis":"These attacks are often carried out through difficult to-trace proxy servers in North Korea, Africa, Eastern Europe and Russia.","titleseo":"telecomnews\/chinese-hackers-step-up-attacks-on-indian-shores","status":"ACTIVE","authors":[{"author_name":"Sachin Dave","author_link":"\/author\/479239123\/sachin-dave","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479239123.cms?width=100&height=100&hid=268","author_additional":{"thumbsize":true,"msid":479239123,"author_name":"Sachin Dave","author_seo_name":"sachin-dave","designation":"Senior Editor","agency":false}}],"Alttitle":{"minfo":""},"artag":"ET Bureau","artdate":"2017-08-08 08:29:24","lastupd":"2017-08-08 08:30:40","breadcrumbTags":["cyber attacks","Indian companies","proxy servers","Internet","VPN","Chinese hackers","IT systems","government institutions","Indian infrastructure company"],"secinfo":{"seolocation":"telecomnews\/chinese-hackers-step-up-attacks-on-indian-shores"}}" data-authors="[" sachin dave"]" data-category-name="" data-category_id="" data-date="2017-08-08" data-index="article_1">

中国黑客加强攻击印度海岸

这些攻击通常是通过困难进行跟踪代理服务器在朝鲜,非洲,东欧和俄罗斯。

萨钦戴夫
  • 更新2017年8月8日凌晨塔利班坚持

孟买:主要印度基础设施公司最近发现它的失望IT系统妥协,黑客获得远程访问的一些最敏感的信息相当长的一段时间。

虽然没有官方公司投诉了,这次袭击可能是众所周知的冰山一角,和网络安全专家参与公司说中国黑客是违反的幕后主使。几个印度公司和一些政府机构增加了吗网络攻击isuppli说,起源于中国。

像在基础设施公司的情况下,这些攻击通常通过困难的跟踪代理服务器在朝鲜、非洲、东欧和俄罗斯。与普通攻击,中国违反往往利用印度IT系统的漏洞,“只是观察。”



“通常情况下,网络攻击来自邻国传递VPN和代理服务器在东欧、非洲、朝鲜和俄罗斯。这些攻击是非常复杂的,计划和针对具体的行业和公司,“Amit Jaju说,迪士尼的法医技术及发现服务的合作伙伴。

专家说的一些部门,包括印度的国防工业,对于这些攻击可能是脆弱的。通常,许多印度企业和政府机构甚至没有意识到网络攻击,除非他们绳的专家进行调查。他们也缺乏适当的操作程序,如国防研究员工或公共部门单位。

“虽然中国、巴基斯坦和伊朗有专门团队的网络黑客(免疫力),很难确定在当今世界传出网络攻击的地方。所有的现代机器——飞机、军舰、坦克和汽车运行在网络技术。

发电和配电电网、银行以及石油和通信行业对潜在的攻击是最脆弱的今天,“D Sivanandhan说,前警察局长,马哈拉施特拉邦。

一些专家认为,中国黑客甚至可能使用社会媒体平台,如Facebook,创建、更改和操作意见的印度人在国内一样。

“令人担心的不仅是,黑客非法获取信息或国防数据的访问,他们可能会操纵舆论....通过有针对性的宣传在社交媒体和其他大众传播模式,“Ajinkya沙尔说:伙伴,卡恩的法律。
  • 发布于2017年8月8日凌晨08:29坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序

MUMBAI: A leading Indian infrastructure company<\/a> recently discovered to its dismay that its IT systems<\/a> were compromised, with hackers gaining remote access to some of the most sensitive information for a fairly long period of time.
\n
While no official complaint has been made by the company, the attack might just be proverbial tip of the iceberg, and cyber-security experts engaged by the firm say
Chinese hackers<\/a> were behind the breach. Several Indian companies<\/a> and some government institutions<\/a> have seen an increase in cyber attacks<\/a> originating in China, say industry trackers.
\n
Like in the case of the infrastructure company, these attacks are often carried out through difficult to-trace
proxy servers<\/a> in North Korea, Africa, Eastern Europe and Russia. Unlike a normal attack, the Chinese breaches tend to exploit vulnerabilities of Indian IT systems and \"just observe.”
\n
\n
\n
\n<\/p>

\n\t\n\t\t\n\t\t\t
\n\t\t\t\t\"\"<\/td>\n\t\t<\/tr>\n\t<\/tbody>\n<\/table><\/div> “Often, cyber attacks originating from neighbouring countries are relayed through VPN<\/a> and proxy servers in eastern Europe, Africa, North Korea and Russia. These attacks are very sophisticated, well planned and targeted toward specific sectors and companies,” said Amit Jaju, partner of EY’s forensic technology & discovery services.
\n
\nExperts say some of the sectors, including India’s defence industries, may be vulnerable against such attacks. Often, many Indian companies and government institutions aren't even aware of the hack unless they rope in a cyber expert to conduct an investigation. They also lack proper operating procedures, such as examining employees of defence or public sector units.
\n
\n“While China, Pakistan and Iran have dedicated teams of cyber hackers (with immunity), it would be difficult to pinpoint in today’s world where the cyber-attack emanated from. All the modern machines – aircraft, warships, tanks and cars – run on cyber technology.
\n
\nThe power generation and distribution grids, banking as well as oil and communication industries are the most vulnerable today against potential attacks,” said D Sivanandhan, former Director General of Police, Maharashtra.
\n
\nSome experts believe that Chinese hackers may even use social media platforms, such as Facebook, to create, change and manipulate opinions of Indians just as they do domestically.
\n
\n“The fear is not only that hackers would obtain information illegally or access defence data but also that they may manipulate public opinion....through a targeted propaganda over social media and other modes of mass communication,” said Tushar Ajinkya, Partner, DSK Legal.
\n\n<\/body>","next_sibling":[{"msid":59964405,"title":"Demonetisation, GST, JioPhone make a dent in smartphone shipments growth projection","entity_type":"ARTICLE","link":"\/news\/demonetisation-gst-and-jiophones-make-a-dent-in-smartphone-shipments-growth-projection\/59964405","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":59964435,"entity_type":"ARTICLE","title":"Chinese hackers step up attacks on Indian shores","synopsis":"These attacks are often carried out through difficult to-trace proxy servers in North Korea, Africa, Eastern Europe and Russia.","titleseo":"telecomnews\/chinese-hackers-step-up-attacks-on-indian-shores","status":"ACTIVE","authors":[{"author_name":"Sachin Dave","author_link":"\/author\/479239123\/sachin-dave","author_image":"https:\/\/etimg.etb2bimg.com\/authorthumb\/479239123.cms?width=100&height=100&hid=268","author_additional":{"thumbsize":true,"msid":479239123,"author_name":"Sachin Dave","author_seo_name":"sachin-dave","designation":"Senior Editor","agency":false}}],"Alttitle":{"minfo":""},"artag":"ET Bureau","artdate":"2017-08-08 08:29:24","lastupd":"2017-08-08 08:30:40","breadcrumbTags":["cyber attacks","Indian companies","proxy servers","Internet","VPN","Chinese hackers","IT systems","government institutions","Indian infrastructure company"],"secinfo":{"seolocation":"telecomnews\/chinese-hackers-step-up-attacks-on-indian-shores"}}" data-news_link="//www.iser-br.com/news/chinese-hackers-step-up-attacks-on-indian-shores/59964435">