Hindustan Times ST (Jaipur)

Election officials in Kashmir targeted by hackers: Experts

- Binayak Dasgupta binayak.dasgupta@htlive.com

THE IDENTITIES OF THE ATTACKERS WERE NOT KNOWN BUT BASED ON DIGITAL CLUES, THE RESEARCHER­S DETERMINED THAT THE DEVELOPERS ARE POSSIBLY BASED IN INDIA

NEW DELHI: Election officials in Kashmir were hacked by a group that has also typically targeted people linked to India’s adversarie­s such as Pakistan, cyber security researcher­s said in a recent analysis after discoverin­g malware and the data that was purportedl­y stolen from victims’ phones.

The discovery was made by San Francisco-based Lookout, which found the evidence of the campaign sitting in unsecured “command and control” servers with 18GB of data. They have identified the hacking group with the codename Confucius and found two malware – Hornbill and Sunbird – which was used to hack into the targets, who were lured into installing fake apps made to resemble real ones.

“The titles, icons and functional­ity appear to be harmless or useful to a potential target, but in reality the applicatio­ns are surveillan­ce ware and send the target’s personal data to a malicious site that the attacker controls,” said by Apurva Kumar, security intelligen­ce engineer at Lookout, in an exchange over email with HT.

The purpose of the hacks was not clear.

The researcher­s said data such as calls logs, SMS messages and Whatsapp conversati­ons were stolen. The findings were made in an analysis published on Thursday and first reported by Bloomberg. The malware was delivered as fake apps disguised as security tools and popular regional chat and dating applicatio­ns.

The identities of the attackers were not known but based on digital clues, the researcher­s determined that the developers are possibly based in India. “In particular, links between the Hornbill developers indicate they all appear to have worked together at a number of Android and IOS app developmen­t companies registered and operating in or near Chandigarh, Punjab,” Kumar added.

The targets of the group also included people associated with the Pakistan Atomic Energy Commission and individual­s with numerous contacts in the Pakistan Air Force, but the researcher­s also found evidence that Indian election officials were hacked.

“Evidence in the exfiltrate­d data shows one particular device located in the Pulwama district of Kashmir. In the list of publicly accessible exfiltrate­d SMS messages, the device received instructio­ns via SMS on logistics for duties of a Booth Level Officer (BLO) in that district. This device also had informatio­n on call logs and contact details,” Kumar said.

The spying on the election officials was carried out at least from late 2018 till early 2019, the data from the targets found on the servers suggested.

Kumar described the sophistica­tion of the group’s technical strategies as “medium”. “One characteri­stic of Hornbill and Sunbird that stands out is their intense focus on exfiltrati­ng a target’s communicat­ions via Whatsapp,” she said, adding that malware could also record calls made through Whatsapp and execute specified commands on an infected device.

HT reached out to the Election Commission and the Ministry of Home Affairs but there was no immediate response on the report.

The use of fake applicatio­ns with names and icons similar to legitimate ones has been of concern. Indian security officials last year warned of similar attempts using fake Aarogya Setu versions.

Experts at the time recommende­d that people should only install apps they know and download from the Google Play Store or Apple’s App Store.

Newspapers in English

Newspapers from India