[Infowarrior] - China mounts cyber attacks on Indian sites

Richard Forno rforno at infowarrior.org
Mon May 5 13:08:34 UTC 2008


China mounts cyber attacks on Indian sites
5 May 2008, 0116 hrs IST,Indrani Bagchi,TNN

http://timesofindia.indiatimes.com/articleshow/msid-3010288,prtpage-1.cms

NEW DELHI: China’s cyber warfare army is marching on, and India is  
suffering silently. Over the past one and a half years, officials  
said, China has mounted almost daily attacks on Indian computer  
networks, both government and private, showing its intent and  
capability. ( Watch: ‘China's cyber intrusion a threat’ )

The sustained assault almost coincides with the history of the present  
political disquiet between the two countries.

According to senior government officials, these attacks are not  
isolated incidents of something so generic or basic as "hacking" —  
they are far more sophisticated and complete — and there is a method  
behind the madness.

Publicly, senior government officials, when questioned, take refuge  
under the argument that "hacking" is a routine activity and happens  
from many areas around the world. But privately, they acknowledge that  
the cyber warfare threat from China is more real than from other  
countries.

The core of the assault is that the Chinese are constantly scanning  
and mapping India’s official networks. This gives them a very good  
idea of not only the content but also of how to disable the networks  
or distract them during a conflict.

This, officials say, is China’s way of gaining "an asymmetrical  
advantage" over a potential adversary.

The big attacks that were sourced to China over the last few months  
included an attack on NIC (National Infomatics Centre), which was  
aimed at the National Security Council, and on the MEA.

Other government networks, said sources, are routinely targeted though  
they haven’t been disabled. A quiet effort is under way to set up  
defence mechanisms, but cyber warfare is yet to become a big component  
of India’s security doctrine. Dedicated teams of officials — all  
underpaid, of course — are involved in a daily deflection of attacks.  
But the real gap is that a retaliatory offensive system is yet to be  
created.

And it’s not difficult, said sources. Chinese networks are very porous  
— and India is an acknowledged IT giant!

There are three main weapons in use against Indian networks — BOTS,  
key loggers and mapping of networks. According to sources in the  
government, Chinese hackers are acknowledged experts in setting up  
BOTS. A BOT is a parasite program embedded in a network, which hijacks  
the network and makes other computers act according to its wishes,  
which, in turn, are controlled by "external" forces.

The controlled computers are known as "zombies" in the colourful  
language of cyber security, and are a key aspect in cyber warfare.  
According to official sources, there are close to 50,000 BOTS in India  
at present — and these are "operational" figures.

What is the danger? Simply put, the danger is that at the appointed  
time, these "external" controllers of BOTNETS will command the  
networks, through the zombies, to move them at will.

Exactly a year ago, Indian computer security experts got a glimpse of  
what could happen when a targeted attack against Estonia shut that  
country down — it was done by one million computers from different  
parts of the world — and many of them were from India! That, officials  
said, was executed by cyber terrorists from Russia, who are deemed to  
be more deadlier.

The point that officials are making is that there are internal  
networks in India that are controlled from outside — a sort of  
cyberspace fifth column. Hence, the need for a more aggressive strategy.

Key loggers is software that scans computers and their processes and  
data the moment you hit a key on the keyboard.

This information is immediately carried over to an external controller  
— so they know even when you change your password. Mapping or scanning  
networks is done as a prerequisite to modern cyber warfare tactics.  
MEA has a three-layered system of computer and network usage — only  
the most open communication is sent on something called "e-grams".

The more classified stuff uses old-economy methods — ironically,  
probably the most secure though a lot more time-consuming. The same is  
true of other critical areas of the government. But the real gap  
inside the national security establishment is one of understanding the  
true nature of the threat.

National security adviser M K Narayanan set up the National Technology  
Research Organization, which is also involved in assessing cyber  
security threats. But the cyber security forum of the National  
Security Council has become defunct after the US spy incident. This  
has scarred the Indian establishment so badly that it’s now frozen in  
its indecision. This has seriously hampered India’s decision-making  
process in cyber warfare.



More information about the Infowarrior mailing list