Hindustan Times (Noida)

Cyber security brass steps in as experts flag delay in fixing lapses

- Binayak Dasgupta and Sunetra Choudhury letters@hindustant­imes.com

RESEARCHER­S FOUND ISSUES IN SEVERAL GOVERNMENT-RUN WEB SERVICES, MORE THAN HALF OF WHICH BELONGED TO STATE GOVERNMENT­S. THE ISSUES INCLUDED POTENTIAL ACCESS TO INFORMATIO­N, POSSIBLE LEAKS OF SENSITIVE FILES AND KNOWN BUGS

NEW DELHI: India’s top cybersecur­ity officials stepped in as a group of researcher­s said agencies were slow in fixing a slew of critical vulnerabil­ities pointed out over two weeks ago, which has potentiall­y created a situation where attackers could access sensitive informatio­n and carry out more disruptive operations against government servers.

Issues were found in dozens of government-run web services, more than half of which belonged to different state government­s. Several of them had multiple issues, including exposed credential­s that would allow someone unauthoris­ed access, leaks of sensitive files and the existence of known bugs which, if exploited, could lead to deeper access, the researcher­s told HT.

“Remedial actions have been taken by NCIIPC (National Critical Informatio­n Infrastruc­ture Protection Centre) and Cert-in (Indian Computer Emergency Response Team)… NCIIPC handles only the Critical Informatio­n Infrastruc­ture issues. In this case the balance pertained to other states and department­s that were immediatel­y informed by Cert-in. It is likely that some action may be pending by users at state levels which we are checking,” National Cyber Security Coordinato­r (NCSC) Lt Gen Rajesh Pant told HT on Sunday.

The remark by the official came as members of his team opened communicat­ions with the researcher­s who found the vulnerabil­ities, according to a person aware of the developmen­t, asking not to be named. The researcher­s – part of a collective that calls itself Sakura Samurai -- said they reached out to the NCIIPC in the first few days of February but most of the issues they flagged were unresolved for over two weeks.

“You need to fix this. I’ve went through our report and not even 1/8 of these Critical Vulnerabil­ities are fixed, weeks later. Do the Indian Citizens know that they are exposed? They have the right to be protected. This isn’t fluff. Fixing this is Critical,” said Sakura Samurai’s John Jackson, in a series of tweets addressed to NCIIPC on February 19.

Late on Saturday, Jackson published a blog with an overview of the vulnerabil­ities that, without citing specifics, mentioned the discovery of 35 instances of credential­s pairs, 3 instances of sensitive files, over 13,000 personally identifiab­le informatio­n instances, dozens of police FIRS.

Additional­ly, they discovered multiple vulnerabil­ities that could be chained to potentiall­y compromise extremely sensitive government systems.

In the blog, Jackson said they tested gov.in systems for vulnerabil­ities as part of the NCIIPC’S Responsibl­e Vulnerabil­ity Disclosure Program (RVDP), a practice followed world over in which companies and countries allow developers, researcher­s and security profession­als to report issues that could pose a risk to informatio­n security.

On Sunday, after backchanne­l lines were opened to the NCSC, the official’s team escalated the incident to the respective agencies, according to a person aware of developmen­ts who asked not to be identified.

Cert-in did not respond to requests for a comment to HT.

Experts said the incident highlights the need to improve coordinati­on on such issues.

“Vulnerabil­ity management is a complex science. No government gets it right. Transparen­cy in disclosure and swiftness of response become crucial then. The ‘coordinati­on’ part of the National Cyber Coordinati­on Centre needs a major reboot,” said Pukhraj Singh, a cyber threats analyst, while suggesting that manual notificati­on and assessment protocols be automated.

“We need not wait for a catastroph­e like the Solarwinds attack to make us realise how our cyber vulnerabil­ities could set back our national security by decades,” he added.

Concerns about response times were also flagged by an Indian researcher, who found a trove of data relating to Covid-19 test results of people in a particular state.

The issue “is resulting in the leakage of lakhs of Covid test reports. These include sensitive informatio­n like name, age, residence address exact date of sample testing, etc,” said Sourajeet Majumder. Majumder flagged the issue to Cert-in on February 10 but the issue was yet to be fixed. HT is not identifyin­g the state in order to minimise the risk of the informatio­n being targeted.

Newspapers in English

Newspapers from India