India hits back with a strategy to thwart cyber threats – A more focused cybersecurity plan

It wasn’t long that I had shared a post around the Chinese hack resulting in power outages in the financial capital of India. A couple of days back, Indians have gone back to the drawing board to think hard and design an effective strategy to defend cyber risks amid China’s cyber threats. The focus has been to strengthen the country’s cybersecurity landscape. According to some of the news sources, it is conclusive that the new planning strategy has been put in place as some of the Chinese intrusions could have possibly affected working operations at a vital stock exchange. The research around these intrusions is currently being investigated and will be brought to lime light at the earliest, probably in a fortnight.

Some of the primitive findings does give a hint about the intrusion but the “what and how” it happened bit of the research is still in progress. Rajesh Pant, a former Indian Army personnel, currently coordinating India’s cyber intelligence, has reported that the interference could possibly be a malware but currently not classifiable as the research around the attack is yet to be concluded. Additionally, Pant has quoted as saying “In my view, if internet-connected computers are infected by malware, I won’t say it’s an attack but an infection unless it jumps from IT systems to other operation systems,” Pant said. “It’s like a crank caller. Can you stop someone from dialing your number?” [Reference]

Source: Reference

According to Recorded future it was conclusive that at least one connection was opened by Chinese state sponsored hackers into the network system of an Indian port which was active, as authorities blocked attempts to penetrate the South Asian nation’s electric sector. After the attack attempt on the power grids in India, it is reported that the Chinese attackers have also targeted Microsoft. Microsoft said that four vulnerabilities in its software allowed hackers to access servers for Microsoft Exchange, “which enabled access to email accounts, and allowed the installation of additional malware to facilitate long-term access to victim environments,” reported CNN.

The new strategies that have been concluded to be put in place has been presented as “The plan will coordinate responses across ministries including Home Affairs, Information Technology, Defence and the National Critical Information Infrastructure Protection Centre in case of an attack and set audit procedures, as quoted by former Lieutenant General Rajesh Pant, India’s National Cyber Security Coordinator. ” This seems to show that India is on target to design an effective and much more resilient cybersecurity posture to stay more vigilant.

Though the current state seems a bit hyped, it has happened in the past with the Stuxnet attack. As governments around the globe took on a frantic conflict against such criminals, a few countries chose to join the criminals. With China’s dynamic support, and that of its comrades, cybercrime has changed, similar as the Chinese virus, to cyber warfare or cyber attacks on a country’s basic foundation. The Stuxnet, the malignant PC worm initially uncovered in 2010 to be responsible for causing substantial damage to the nuclear program of Iran. Albeit neither one of the countries has transparently conceded duty, the worm is broadly perceived to be a cyber weapon fabricated mutually by the United States and Israel in a collective exertion known as the “Olympic Games”, the main illustration of cyber warfare. We are not that far away from witnessing a world full of cyber wars.

Article by Kaushik Sundararajan

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective.

Published by The Art of Cyber-Space

I am a security professional specializing in network security. With vivid experience in different industries, I am looking to explore the current cyberspace and discuss the ideology of certain ideas from a different perspective.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: