Chinese hackers steal data of Indian Government: American Company

Spread the love

Recorded Future Inc, a US-based private cyber security firm, has revealed that Chinese hackers have targeted Indian government agencies and large media companies. The report claimed that Chinese state-sponsored hackers stole some data by infiltrating India’s national identity database UIDAI and the Times Group, one of the country’s largest media groups.

According to media reports, the Insect Group, the Threat Research Division of Massachusetts-based Recorded Future, said that the hacking group, tentatively named TAG-28, used Winnti malware for this. However, Chinese officials have denied any hacking. This malware also works specifically with several Chinese activity groups.

Chinese officials have consistently denied any form of state-sponsored hacking, saying China itself is a major target of cyber attacks.

The Unique Identification Authority of India’s (UIDAI) network is believed to have been breached during the tracked incursions between June and July this year, though it is not clear what data has been captured as per the recorded future. Let us tell you that more than one billion Indian citizens have personal biometric information.

According to BloombergQuint, the government agency said it was not aware of such hacking, as its database was encrypted and available only to users with multifactor authentication. An e-mail said the agency has a robust security system which is continuously upgraded to maintain the highest level of data security and integrity.

According to media reports, Recorded Future in its report said that Bennett Coleman & Company, also known as Times Group, which publishes the English newspaper Times of India, was also targeted by Chinese hackers. Recorded Future said data was extracted from the company between February and August, but it was not clear if the data had been stolen. However, Rajiv Batra, Chief Information Officer of Times Group has rubbished the report.

The cybersecurity firm says the hackers used detection techniques and traffic analysis to identify patterns of suspicious network traffic between the servers of a government agency and media company and the servers used to control and control the hackers’ malware. used a combination of data. China’s foreign ministry declined to comment immediately.

Leave a Reply

Your email address will not be published. Required fields are marked *