Pakistan Clashes With India In Cyberspace

Pakistani cyber warriors, in an attempt to retaliate against India'a decision to abolish autonomous local governmnet status in Kashmir, have flooded social media platforms with anti-India posts.

Security agencies and cyber experts have found that thousands of fake accounts have been created from Pakistan to peddle fake news, morphed pictures, and old videos to show India and its armed forces in a bad light.

Sources at India's central surveillance agency are reported as saying that the Inter-Services Intelligence (ISI), the intelligence agency of Pakistan, is on a hiring spree recruiting a pool of social media experts and hackers to wage information warfare by circulating fake information.

Thousands of fake profiles have been created recently on Facebook and Twitter to spread anti-India content. According to a senior Indian security officer, Pakistan has a large team of influencers who are spreading anti-India propaganda on social media. Security forces are said to be tracking these handles and doing a geographical mapping. 

The Narendra Modi-led national government of India scrapped Article 370 oc the Constitution and have divided the regions of Jammu and Kashmir into two Union Territories - Kashmir with a Legislature, and Jammu without a Legislature. 

Following this historic decision, Pakistani influences allegedly circulated doctored videos of Indian media to show how local opinion as being against the move. After analysing these videos, it was found that all the atrocity videos, images and news coverage being circulated had no link with the current situation in Kashmir.

Deep analysis by a Delhi based cybersecurity firm - Innefu Labs, shows that thousands of accounts, pages and group on social media are active in Pakistan region which is involved in peddling fake news, targeting ideas and circulating negative propaganda.

"We have found that just after the annulment of Article 370, more than 1,500 bots (fake profiles) from Pakistan surfaced on social media and started trending anti-India narrative. In these tweets, they are also urging United Nations to intervene," said Tarun Vig, co-founder of Innefu Labs. 

The bot accounts and the Pakistan-based propaganda accounts are all connected, as they are also retweeting and following each other on Twitter, tending to confirm an organised group is behind it. Vig highlighted that dedicated accounts across social media platforms are being created at an unprecedented rate to systematically criticise India's image and diplomatic influence.

Security agencies are closely monitoring Pakistan supporters' communication network on WhatsApp and Telegram groups to gather more information on them. Similar information warfare from Pakistan was witnessed duping the Pulwama attack and Balakot airstrike after which the tension between India and Pakistan was at an all-time high.

India Today

You Might Also Read: 

Hong Kong Protesters Disrupted By Cyber Attacks:

Iran Using Websites To Spread Fake News:

 

 

« Over 60% of Enterprises Fail to Build Effective Cloud Security
What’s On The Dark Web? »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

F5 Networks

F5 Networks

F5 products ensure that network applications are always secure and perform the way they should—anywhere, any time, and on any device.

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

Guy Carpenter

Guy Carpenter

Guy Carpenter delivers a powerful combination of broking expertise, strategic advisory services, and industry-leading analytics.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

Zeneth Technology Partners

Zeneth Technology Partners

Zeneth is a consulting firm providing information technology and cybersecurity services to federal and commercial clients.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

Ceerus

Ceerus

Ceerus was created to simplify the process of deploying and managing security across all the channels in an organisation.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Cycode

Cycode

Cycode is the industry’s first source code control, detection, and response platform.

QI ANXIN Technology Group

QI ANXIN Technology Group

QI ANXIN specializes in serving the cybersecurity market by offering next generation enterprise-class cybersecurity products and services to government and businesses.

DNX Ventures

DNX Ventures

Based in Silicon Valley and Tokyo, DNX Ventures is an early stage VC for B2B startups in sectors including Cybersecurity.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Laminar

Laminar

Laminar provides the only Public Cloud Data Protection solution that provides full visibility and enforcement capabilities across your entire public cloud infrastructure.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

CyberRey

CyberRey

CyberRey is a leading distributor of comprehensive cybersecurity solutions, empowering organizations of all sizes to thrive in the digital age.