The Chinese Hacked Indian Navy SystemsAdded: Friday, July 6th, 2012
Category: Recent Headlines Involving File Sharing > Current Events
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, 2010, www.extrattorrent.com
According to the latest security reports, India has left contemplating its naval, as the Chinese hackers managed to take out the computer system on the National Navy’s Eastern Command.
The intruders managed to plant malware on the targeted system based near the city of Visakhaptnam. The malware in question sent sensitive information to specific IP addresses in China. Local media reported how the country’s first nuclear missile submarine, named INS Arihant, had been running trials at the facility and might have got the bug.
The malware was said to work the following way: it had created a hidden folder where it copied specific files and documents based on the keywords it had been programmed to identify. The folder remained hidden on the pen drives until those were put in the machines connected to the web. That’s when the bug silently sent the collected files to the specific IP addresses in China.
Thus far, it is unclear how much was stolen in the hacking raid. The experts also can’t say whether the malware in question operated like Stuxnet and needed to be installed within the system by a spook first. Meanwhile, India has already arrested six officers for procedural lapses that caused the breach. The authorities do not reveal whether any of the officers can later face spying charges.
The interesting part of the story is that the national navy stores sensitive information only in standalone machines that are never connected to the Internet. Moreover, these computers also can’t have any ports or access points to use flash drives or external storage devices. How the malware got into machines should be a mystery for the Indians…
July 6th,2012Posted by:
Friday, July 6th, 2012
|posted by (2012-07-06 16:08:06)|
|Well most likely the Chinese intercepted these computer systems before they were installed at the Indian Navy facility. Operatives then bugged the system. I recall the CIA and Mossad doing similar things to Iran. That is the risk nations take when purchasing foreign military technology.|
|Thats Crazy! If you right finagawd then finally US did something right lol.|
|So the motherboard has no USB ports? No Keyboard port? Mouse port?|
Somebody was paid some where...
|posted by (2012-07-07 07:31:06)|
|I guess calling the help center, and getting a Patel telling you that the supervisor isn't available, doesn't count...|
|posted by (2012-07-07 17:21:13)|
|Well it should be the work of some under cover rogue agent or a Honey bee trap used probably. Its become quite common. @ponklay: I do not recall any such statement, care to impress me with substantial proof where Indian Navy has come up with such a bizarre statement when the govt. is so cheap on releasing funds to the armed forces.|
|posted by (2012-07-07 17:30:48)|
|In indian navy only sailors are not allowed to carry pen drives, external hard drives etc.officers can carry any thing no security checks for them.|
|I am more interested in questioning where the said report originated as Finagawd commented that this is a practice adopted previously by American and Mossad agencies and since as we know routing through servers can be done from anywhere in the world for example we are all discussing this on a ukraine server which has an ip address of 184.108.40.206 ,but I for one am in the UK.|
|Whichever the country whether USA ,China,Russia,whoever the fact that their Naval officers connected to the world wide web is the breach and was a breach perpetrated by themselves in the first place since an unconnected standalone computer is just that and in the uk the MOD and navy use a RAM drive system in standalone PC and all HDD`s are removed when not in service and under lock and key,so without access ports for pen drives or internet connection how was access achieved,Hmmm further checking into the report origins needs to be done as if no access ports some one would need to purposely open up the PC to connect a usb device in the first place which is spying by their own and it all sounds too convenient and impractical.|
|lol your good Emboism. I like the way you think dude. It's amazing what people do these days.|
|posted by (2012-07-08 19:30:50)|
|Everyone has a price, there's always a number/amount/ they would settle for.|
|they might have installed chinese made motherboards in their systems|
|The first line of the report gives cause to doubt the credibility of the report since it does`nt name the source and could very easily be another American smear campaign perpetrated by the USA and or Bloomberg.The IP addresses could well be faked since they do not state whether government servers or not and IP addresses are not definitive proof as to who is actually receiving the data since as we all know you do not have to be in a country to use its servers,proof of this is apparent since we are all using a Ukraine server now but how many of us are actually in the Ukraine,not I for one,words of caution did Iraq have WMD`s No,hard facts is all I believe and I believed in Hans Blix and the UN teams 700 visits to Iraq installations over 12 years which found no capability for WMD,don`t believe the Hype.|
|posted by (2012-07-19 23:23:42)|
|computers without acces points... they may could used bluetooth! hahaha||
Most Popular Stories