'Amidst border tension, Chinese hackers targeted India’s power through malware'

Agencies
March 1, 2021

Amidst heightened border tension, Chinese hackers targeted India's power  through malware: US firm | Law-Order

Washington, Mar 1: Amidst the tense border tension between India and China, a Chinese government-linked group of hackers targeted India's critical power grid system through malware, a US company has claimed in its latest study, raising suspicion whether last year's massive power outage in Mumbai was a result of the online intrusion.

Recorded Future, a Massachusetts-based company which studies the use of the internet by state actors, in its recent report details the campaign conducted by a China-linked threat activity group RedEcho targeting the Indian power sector.

The activity was identified through a combination of large-scale automated network traffic analytics and expert analysis.

Data sources include the Recorded Future Platform, SecurityTrails, Spur, Farsight and common open-source tools and techniques, the report said.

On October 12, a grid failure in Mumbai resulted in massive power outages, stopping trains on tracks, hampering those working from home amidst the COVID-19 pandemic and hitting the stuttering economic activity hard.

It took two hours for the power supply to resume for essential services, prompting Chief Minister Uddhav Thackeray to order an enquiry into the incident.

In its report, Recorded Future notified the appropriate Indian government departments prior to publication of the suspected intrusions to support incident response and remediation investigations within the impacted organisations.

There was no immediate response from the Indian government on the study by the US company.

Since early 2020, Recorded Future's Insikt Group observed a large increase in suspected targeted intrusion activity against Indian organisations from the Chinese state-sponsored group.

The New York Times, in a report, said that the discovery raises the question about whether the Mumbai outage was meant as a message from Beijing about what might happen if India pushed its border claims too vigorously.

According to the Recorded Future report, from mid-2020 onwards, Recorded Future's midpoint collection revealed a steep rise in the use of infrastructure tracked as AXIOMATICASYMPTOTE, which encompasses ShadowPad command and control (C2) servers, to target a large swathe of India's power sector.

Ten distinct Indian power sector organisations, including four of the five Regional Load Despatch Centres (RLDC) responsible for operation of the power grid through balancing electricity supply and demand, have been identified as targets in a concerted campaign against India's critical infrastructure.

Other targets identified included two Indian seaports, it said.

According to the report, the targeting of Indian critical infrastructure offers limited economic espionage opportunities.

However, we assess they pose significant concerns over potential pre-positioning of network access to support Chinese strategic objectives, it said.

Pre-positioning on energy assets may support several potential outcomes, including geostrategic signalling during heightened bilateral tensions, supporting influence operations, or as a precursor to kinetic escalation, Recorded Future said.

RedEcho has strong infrastructure and victimology overlaps with Chinese groups APT41/Barium and Tonto Team, while ShadowPad is used by at least five distinct Chinese groups, it said.

The high concentration of IPs (Internet Protocols) resolving to Indian critical infrastructure entities communicating over several months with a distinct subset of AXIOMATICASYMPTOTE servers used by RedEcho indicate a targeted campaign, with little evidence of wider targeting in Recorded Future's network telemetry, it said.

Recorded Future said that in the lead-up to the May 2020 border skirmishes, it observed a noticeable increase in the provisioning of PlugX malware C2 infrastructure, much of which was subsequently used in intrusion activity targeting Indian organisations.

The PlugX activity included the targeting of multiple Indian government, public sector and defence organisations from at least May 2020, it said.

While not unique to Chinese cyber espionage activity, PlugX has been heavily used by China-nexus groups for many years.

Throughout the remainder of 2020, we identified a heavy focus on the targeting of Indian government and private sector organisations by multiple Chinese state-sponsored threat activity groups, it said.

In its report, Recorder Future alleged that it also observed the suspected Indian state-sponsored group Sidewinder target Chinese military and government entities in 2020, in activity overlapping with recent Trend Micro research.

The Massachusetts-based company's report came as the armies of the two countries began disengagement of troops locked in over eight-month-long standoff in eastern Ladakh.

Both countries reached a mutual agreement last month for the disengagement of troops from the most contentious area of North and South banks of the Pangong Lake.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 29,2025

DKSsiddu.jpg

New Delhi: Karnataka chief minister Siddaramaiah and deputy CM DK Shivakumar on Saturday put up a dramatic display of unity at a closely watched joint press briefing, firmly dismissing weeks of speculation about a power-sharing tussle within the Congress. With the high command nudging both leaders to sit together and settle the dust, the meeting became a political spectacle, ending with the duo declaring that there was “no confusion, no differences.”

Calling the reports of a rift “manufactured confusion,” Siddaramaiah said the talks had gone smoothly, even joking about their breakfast. “Breakfast was very good. All three of us enjoyed it,” he said. “We want to end this confusion once and for all. For local elections and for 2028, our mission is clear — Congress must return to power. There is no difference between me and DKS, not now, not before.”

He blamed the media for fuelling rumours and reiterated absolute adherence to the party leadership. “From tomorrow, let there be no confusion. What the high command says, we will follow.”

Siddaramaiah also assured that the Assembly session starting December 8 would run smoothly and vowed that Congress would take on the BJP and JD(S) “together.”

Shivakumar echoed the chief minister word for word, stressing loyalty and discipline. “People have given us a massive mandate. It is our duty to deliver,” he said. “This government was formed under Siddaramaiah’s leadership. We both have complete trust in the high command. If they tell me to wait, I will wait.”

He added that the two leaders had discussed strategy for the 2028 Assembly elections. “Whatever the CM says, I agree. We are loyal soldiers of the party. The party may be facing challenges nationally, but we will keep it strong in Karnataka.”

Shivakumar also said Siddaramaiah would soon visit his home for lunch or dinner — another symbolic gesture meant to underline their unity.

Both leaders later posted on social media describing the breakfast meeting as “productive” and focused on “Karnataka’s priorities.”

The BJP, however, rejected the show of camaraderie as “pure bunkum,” accusing Congress of trying to paper over an internal power struggle. But Siddaramaiah and Shivakumar insisted their united front would continue — and that there was “no confusion” within the state leadership.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
November 22,2025

gaza.jpg

The Israeli regime’s forces have killed two Palestinian children in the Gaza Strip every day since the ceasefire began in early October, UNICEF has warned.

The UN children’s agency said on Friday that Israeli forces continue to attack Palestinians in Gaza even though the agreement was meant to stop the killing.

“Since 11 October, while the ceasefire has been in effect, at least 67 children have been killed in conflict-related incidents in the Gaza Strip. Dozens more have been injured. That is an average of almost two children killed every day since the ceasefire took effect,” UNICEF spokesperson Ricardo Pires said in Geneva, reminding that each number in the statistics represents a child whose life had ended violently.

“These are not statistics,” he said. “Each child had a story, a family, and a future that was stolen from them.”

Data from Palestinian factions, human rights groups, and government bodies recorded since the US-brokered ceasefire deal went into effect on October 10 show that Israeli forces have carried out numerous attacks, each constituting a separate ceasefire violation.

UNICEF teams say they repeatedly continue to witness heart-wrenching scenes of fearful Palestinian children sleeping outdoors with amputated limbs, while others live as orphans in flooded, makeshift shelters.

“I saw this myself in August. There is no safe place for them. The world cannot normalize their suffering,” Pires said, lamenting that the UN could “do a lot more if the aid that is really needed was entering faster.”

The UNICEF spokesperson warned that with the advent of winter, the risks for hundreds of thousands of displaced children will increase.

He warned, “The stakes are incredibly high” for children as winter acts as a threat multiplier, where children have no heating, no insulation, and few blankets. He said respiratory infections rise.

“Too many children have already paid the highest price,” Pires said. “Too many are still paying it, even under a ceasefire. The world promised them it would stop and that we would protect them.”

“Now we must act like it,” the UNICEF spokesperson added.

Since the Israeli regime launched its genocidal war against Palestinians in Gaza in October 2023, it has killed nearly 70,000 people in the territory, most of them women and children, and injured over 170,000 more, while reducing most of the structures in the enclave to rubble.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.
News Network
December 4,2025

Udupi: A 40-year-old NRI from Udupi has reportedly lost more than Rs 12.25 lakh in an online investment scam operated through Telegram.

According to a complaint filed at the CEN police station, Leo Jerome Mendonsa, who has been working in Dubai for the past 15 years in computer accessories sales, maintains NRI accounts in Karkala and Nitte.

On November 12, 2025, Mendonsa was added to a Telegram group called Instaflow Earnings by unknown individuals. Users identified as Priya and Dipannita persuaded him to invest in “Revenue Tasks.” Initially, Mendonsa transferred Rs 1,100 multiple times and received the promised returns, encouraging him to continue.

On November 14, another user, Nishmitha Shetty, directed him to register on a website, digitvisionuoce.cc, and invest Rs 4 lakh in various shares. Over the next few days, he made multiple transfers totaling Rs 12,25,000, including Rs 50,000 via Google Pay, believing the scheme was legitimate.

After receiving the money, the alleged handlers stopped responding, and neither the invested amount nor the promised profits were returned.

The CEN police have registered a case under Sections 66(C) and 66(D) of the IT Act and Section 318(4) of the Bharatiya Nyaya Sanhita (BNS), and investigations are ongoing.

Comments

Add new comment

  • Coastaldigest.com reserves the right to delete or block any comments.
  • Coastaldigset.com is not responsible for its readers’ comments.
  • Comments that are abusive, incendiary or irrelevant are strictly prohibited.
  • Please use a genuine email ID and provide your name to avoid reject.