China & India In Cyber Conflict

India and China have tried to peacefully share thousands of miles of border amidst the world’s most inhospitable terrain, nestled in the Himalayan mountain range. The last military war between the two countries was in 1962, and resulted in parts of the border being declared 'in dispute' with a mutually recognised “Line of Actual Control” agreed.  

But relations between the two have deteriorated significantly in recent years and diplomacy and economic factors have been effective in preventing a repeat full-blown war. Today, cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

Now "the impact of a cyber attack targeting the critical infrastructure of a country, whether for espionage or malicious activity, has the potential to be catastrophic with long-term repercussions”, says Dr. Christopher Ahlberg, CEO of Recorded Future. “We have long seen cyber efforts from China aimed around strategic policies and initiatives, and this campaign from RedEcho is no exception. Accurate and actionable intelligence is vital for preempting such attacks and proactively disrupting adversaries both within an organisation and across a nation," he added.

China is more and more dependent on information networks in all industrial aspects, including defence. Although it has a large-scale technology industry and possesses the potential to compete with the US in some, most of its core network technologies and key software and hardware are provided by US companies, whereas India’s capacity is home grown. 

Using a combination of proactive adversary infrastructure detections, domain and traffic analysis, Recorded Future’s threat research experts, the Insikt Group, has determined that a subset of the servers used share some common infrastructure tactics, techniques, and procedures with several previously reported Chinese state-sponsored groups.

Insikt Group is attributing this activity to a threat group known as RedEcho, though to be targeting 10 distinct Indian organisations in the power generation and transmission sector and two organisations in the maritime sector. Insikt Group believes the targeting of these organisations poses significant concerns over potential pre-positioning of network access to support Chinese strategic objectives.

The computer network operations targeting of strategically important organisations in India from Chinese groups will likely continue in 2021 as the nation continues to exert influence over countries that are within the sphere of their Belt and Road Initiative investment program.

The next steps for India are to have the targeted entities and those organisations with responsibility for protecting India’s national infrastructure, Indian CERT, Ministry of Power and the National Critical Information Infrastructure Protection Centre (NCIIPC) conduct a thorough cyber analysis and develop a future strategy. 

Recorded Future:      PR Newswire:     Security Boulevard:   The Wire:    Sunday Guardian:

You Might Also Read: 

Cyber Attack On A Nuclear Power Plant:

 

« How Has A Year Of Pandemic Changed Cyber Security?
New Digital Qualifications For The British Workforce »

Perimeter 81

Directory of Suppliers

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cysec Resource  Co.

Cysec Resource Co.

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

Airbus Cybersecurity

Airbus Cybersecurity

Airbus CyberSecurity is a European specialist in cyber security. Our mission is to protect governments, military and critical national infrastructure enterprises from cyber threats.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Government Communications Security Bureau (GCSB)

Government Communications Security Bureau (GCSB)

GCSB contributes to New Zealand’s national security by providing information assurance and cyber security to the New Zealand Government and critical infrastructure organisations.

Harel Mallac Technologies

Harel Mallac Technologies

Harel Mallac Technologies is a Mauritian organisation that has developed a strong network of ICT specialists with nodes across the African continent.

Synectics Solutions

Synectics Solutions

Synectics deliver solutions for reducing risk, combating financial crime, and enabling organisations to meet their compliance and regulatory commitments.

Proton Data Security

Proton Data Security

Proton Data Security is a certified small business specializing in the design, manufacturing and sales of data security products for permanent erasure of hard drives, tapes and optical media.

Global Accelerator Network (GAN)

Global Accelerator Network (GAN)

Global Accelerator Network are a highly curated community of independent Accelerators, Partners and Investors.

Digitalsec

Digitalsec

Digitalsec is a cybersecurity consultancy that provides vulnerability assessments and penetration tests.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.