China & India In Cyber Conflict

India and China have tried to peacefully share thousands of miles of border amidst the world’s most inhospitable terrain, nestled in the Himalayan mountain range. The last military war between the two countries was in 1962, and resulted in parts of the border being declared 'in dispute' with a mutually recognised “Line of Actual Control” agreed.  

But relations between the two have deteriorated significantly in recent years and diplomacy and economic factors have been effective in preventing a repeat full-blown war. Today, cyber operations provide both countries with a potent asymmetric capability to conduct cyber surveillance and espionage.

Now "the impact of a cyber attack targeting the critical infrastructure of a country, whether for espionage or malicious activity, has the potential to be catastrophic with long-term repercussions”, says Dr. Christopher Ahlberg, CEO of Recorded Future. “We have long seen cyber efforts from China aimed around strategic policies and initiatives, and this campaign from RedEcho is no exception. Accurate and actionable intelligence is vital for preempting such attacks and proactively disrupting adversaries both within an organisation and across a nation," he added.

China is more and more dependent on information networks in all industrial aspects, including defence. Although it has a large-scale technology industry and possesses the potential to compete with the US in some, most of its core network technologies and key software and hardware are provided by US companies, whereas India’s capacity is home grown. 

Using a combination of proactive adversary infrastructure detections, domain and traffic analysis, Recorded Future’s threat research experts, the Insikt Group, has determined that a subset of the servers used share some common infrastructure tactics, techniques, and procedures with several previously reported Chinese state-sponsored groups.

Insikt Group is attributing this activity to a threat group known as RedEcho, though to be targeting 10 distinct Indian organisations in the power generation and transmission sector and two organisations in the maritime sector. Insikt Group believes the targeting of these organisations poses significant concerns over potential pre-positioning of network access to support Chinese strategic objectives.

The computer network operations targeting of strategically important organisations in India from Chinese groups will likely continue in 2021 as the nation continues to exert influence over countries that are within the sphere of their Belt and Road Initiative investment program.

The next steps for India are to have the targeted entities and those organisations with responsibility for protecting India’s national infrastructure, Indian CERT, Ministry of Power and the National Critical Information Infrastructure Protection Centre (NCIIPC) conduct a thorough cyber analysis and develop a future strategy. 

Recorded Future:      PR Newswire:     Security Boulevard:   The Wire:    Sunday Guardian:

You Might Also Read: 

Cyber Attack On A Nuclear Power Plant:

 

« How Has A Year Of Pandemic Changed Cyber Security?
New Digital Qualifications For The British Workforce »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Securosis

Securosis

Securosis is an information security research and advisory firm dedicated to improving the practice of information security.

Virus Bulletin

Virus Bulletin

Virus Bulletin is an online security information portal and certification body, providing users with independent intelligence about the latest developments in the global threat landscape.

Ethio-CERT

Ethio-CERT

National Cyber Emergency Readiness and Response Team of Ethiopia.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

Silicon:SAFE

Silicon:SAFE

Silicon:SAFE develops impenetrable hardware solutions that prevent bulk data theft during a cyber-attack.

Gemserv

Gemserv

Gemserv is a specialist market design, governance and assurance services consultancy.

Luxembourg Office of Accreditation & Surveillance (OLAS)

Luxembourg Office of Accreditation & Surveillance (OLAS)

OLAS is the national accreditation body for Luxembourg. The directory of members provides details of organisations offering certification services for ISO 27001.

Liquid Technology

Liquid Technology

Liquid Technology provide DOD- and NIST-compliant data destruction and EPA-compliant e-waste disposal and recycling services throughout North America, Europe and Asia.

EvoNexus

EvoNexus

EvoNexus is a technology startup incubator with locations in San Diego, Orange County, and Silicon Valley.

Symantec Ventures

Symantec Ventures

Symantec Ventures is an active, strategic partner at key stages of a startup’s growth. We are dedicated to helping visionary entrepreneurs protect the Cloud Generation.

Netacea

Netacea

Netacea provides a revolutionary bot management solution that protects websites, mobile apps and APIs from malicious attacks such as scraping, credential stuffing and account takeover.

Penten

Penten

Penten is an Australian-based cyber security company focused on innovation in secure mobility and applied AI (artificial intelligence).

Traced

Traced

At Traced, our aim is to redefine mobile cyber security to provide the best possible protection to everyone against breaches of privacy and security.

Information & Communications Technology Association of Jordan (int@j)

Information & Communications Technology Association of Jordan (int@j)

The Information & Communications Technology Association of Jordan is a membership based ICT and IT Enabled Services (ITES) industry advocacy, support and networking association.

Securadin

Securadin

Securadin - Defending Your Data Security. We will assist you in learning how to maintain the confidentiality, integrity, and availability of your organization's assets.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.