text
stringlengths 4
429
|
---|
Academics/Journalists focused on the PRC
|
During our investigations we found that a variety of academic targets had been compromised, including those at
|
the Institute for Defence Studies and Analyses (IDSA) as well as journalists at India Strategic defence magazine
|
and FORCE magazine. The exfiltrated papers included those discussing the containment of the PRC, Chinese
|
military exports, and Chinese foreign policy on Taiwan and Sino-Indian relations. More specifically, there were
|
documents that focused on ethnicity, religion and politics in Central Asia, and the links between armed groups
|
and the PRC. Although the academic papers exfiltrated by the attackers are publicly available, the content of the
|
material indicates that the attackers managed to compromise those with a keen interest in the PRC.
|
4.3.2 Affected Institutions
|
During our investigations we found that a variety of personal information belonging to individuals had been
|
compromised. This included various lists of contacts along with their personal details that could be used by the
|
attackers. It also included information about travel, including air and rail tickets, receipts, invoices and other
|
billing information. In addition we found personal banking information, scans of identification documents,
|
job (and other) applications, legal documents and information about ongoing court cases. The attackers also
|
exfiltrated personal email communications. All of this information can be leveraged for future attacks, especially
|
attacks against those within the compromised individual
|
s social network.
|
National Security Council Secretariat, India
|
The National Security Council Secretariat (NSCS) of India is comprised of the Joint Intelligence Committee
|
and is a component of the National Security Council established in 1998 along with a Strategic Policy
|
Group and an Advisory Board. The National Security Council is headed by the Prime Minister of India and
|
is responsible for strategic planning in the area of national security (Subrahmanyam 2010; Indian Embassy
|
1998). We assess that a computer at the NSCS was compromised based on the documents exfiltrated by the
|
attackers. During the period in which we monitored the attackers, fourteen documents, including two documents marked
|
SECRET,
|
were exfiltrated. In addition to documents containing the personal and financial
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
information of what appears to be the compromised individual, the exfiltrated documents focus on India
|
security situation in the states of Assam, Manipur, Nagaland and Tripura as well as the Naxalites, Maoists,
|
and what is referred to as
|
left wing extremism.
|
Diplomatic Missions, India
|
India maintains numerous diplomatic missions abroad that provide consular services relating to passports
|
and visas as well as faciltaing trade, commerce and engaging in diplomatic relations (Indian government
|
2010). We assess that computers at the Embassy of India, Kabul, the Embassy of India, Moscow, the
|
Consulate General of India, Dubai, and the High Commission of India in Abuja, Nigeria were compromised
|
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
|
99 documents, including what appears to be one encrypted diplomatic correspondence as well as five documents marked
|
RESTRICTED
|
and four documents marked
|
CONFIDENTIAL,
|
were exfiltrated. In addition
|
to documents containing personal, financial, and travel information on embassy and diplomatic staff, the
|
exfiltrated documents included numerous visa applications, passport office circulars, and country assessments and reports. Confidential visa applications from citizens of Afghanistan, Australia, Canada, the PRC,
|
Croatia, Denmark, Germany, India, Ireland, Italy, New Zealand, Philippines, Senegal, Switzerland, Uganda,
|
and the United Kingdom were among the exfiltrated documents.
|
Military Engineer Services, India
|
The Military Engineer Services (MES) is a government construction agency that provides services to the
|
Indian Army, Navy and Air Force. In addition, the MES services the government sector and civil works projects.
|
We assess that computers at the MES-Bengdubi, MES-Kolkata, MES(AF)-Bangalore, and MES-Jalandhar were
|
compromised based on the documents exfiltrated by the attackers. During the period in which we monitored
|
the attackers, 78 documents were exfiltrated. While these documents included manuals and forms that would
|
not be considered sensitive, they also included documents that contained private information on personnel,
|
and documents and presentations concerning the financing and scheduling of specific engineering projects.
|
Military Personnel, India
|
We assess that computers linked with the 21 Mountain Artillery Brigade in the state of Assam, the Air Force
|
Station, Race Course, New Delhi and the Air Force Station, Darjipura Vadodara, Gujarat were compromised
|
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
|
sixteen documents were exfiltrated. One document contained personal information on Saikorian alumni of
|
the Sainik School, Korukonda, which prepares students for entry into the National Defence Academy. One
|
document is a detailed briefing on a live fire exercise while others pertain to surface-to-air missile systems
|
and moving target indicators.
|
Military Educational Institutions, India
|
We assess that computers at the Army Institute of Technology in Pune, Maharashtra and the Military College
|
of Electronics and Mechanical Engineering in Secunderabad, Andhra Pradesh were compromised based on
|
the documents exfiltrated by the attackers. During the period in which we monitored the attackers, twentyone documents, including one marked
|
RESTRICTED
|
, were exfiltrated. There are documents and presentations detailing the finances of one of the institutions as well as personal and private information on students
|
and their travel. There is also a document that describes
|
Project Shakti,
|
the Indian Army
|
s command and
|
control system for artillery (India Defence 2007).
|
Institute for Defence Studies and Analyses, India
|
We assess that computers at the Institute for Defence Studies and Analyses (IDSA) were compromised based
|
on the documents exfiltrated by the attackers. During the period in which we monitored the attackers, 187
|
documents were exfiltrated. While many of the documents were published papers from a variety of academic
|
sources, there were internal documents, such as an overview of the IDSA research agenda, minutes of
|
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
|
meetings for the Journal of Defence Studies, budgets and information on a variety of speakers, visitors, and
|
conference participants.
|
Defence-oriented publications, India
|
We assess that computers at the India Strategic defence magazine and FORCE magazine were compromised
|
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
|
58 documents were exfiltrated. While these documents include publicly accessible articles and previous
|
drafts of those articles, there is also private information regarding the contact details of subscribers and conference participants. The documents also include interviews, documents, and PowerPoint presentations from
|
conferences that detail national security topics, such as network data and monitoring for national security,
|
and responses to combat cyber threats.
|
Corporations, India
|
We assess that computers at YKK India Private Limited, DLF Limited, and TATA were compromised based
|
on the documents exfiltrated by the attackers. During the period in which we monitored the attackers, five
|
documents were exfiltrated. These documents include rules overseeing busiiness travel, a presentation on
|
roadmap and financial status, and an annual plan for a business partnership.
|
Maritime, India
|
We assess that computers at the National Maritime Foundation and the Gujarat Chemical Port Terminal
|
Company Limited were compromised based on the documents exfiltrated by the attackers. During the period
|
in which we monitored the attackers, 53 documents were exfiltrated. These documents include a summary
|
of a seminar as well as numerous documents relating to specific shipping schedules, financial matters and
|
personal medical information.
|
United Nations
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.