PAK CYBER GROUP STEALS 16GB OF INDIAN MILITARY DATA
the “pdf” file, his system got infected with a Trojan, which also infected the main server connected to the victim and took screenshots, recorded audio, stole files and logged the keys entered by the user. Trend Micro came across this cyber stealing while it was monitoring other targeted campaigns. What has come as a surprise to cyber security experts is that despite not being particularly sophisticated, these hackers were still able to get sensitive information from restricted sources within the Indian government.
Like most such cyber attackers, the perpetrators used emails as their point of entry and as per the investigation by Trend Micro, the attackers had a very good idea regarding what the individual targets were interested in and what “subject line” they were most likely to click on.
India’s Computer Emergency Response Team (CERT), a body under the Ministry of Communication and Technology, responsible for “enhancing India’s communication and information infrastructure through proactive action and effective collaboration”, seems to be oblivious of this cyber attack. CERT’s website, which is supposed to carry security bulletins every month, does not mention this attack. Its annual report too was last updated on the website in 2014. The security advisories issued by CERT available on its website were mostly confined to bugs in Microsoft products.