text
stringlengths
4
429
Academics/Journalists focused on the PRC
During our investigations we found that a variety of academic targets had been compromised, including those at
the Institute for Defence Studies and Analyses (IDSA) as well as journalists at India Strategic defence magazine
and FORCE magazine. The exfiltrated papers included those discussing the containment of the PRC, Chinese
military exports, and Chinese foreign policy on Taiwan and Sino-Indian relations. More specifically, there were
documents that focused on ethnicity, religion and politics in Central Asia, and the links between armed groups
and the PRC. Although the academic papers exfiltrated by the attackers are publicly available, the content of the
material indicates that the attackers managed to compromise those with a keen interest in the PRC.
4.3.2 Affected Institutions
During our investigations we found that a variety of personal information belonging to individuals had been
compromised. This included various lists of contacts along with their personal details that could be used by the
attackers. It also included information about travel, including air and rail tickets, receipts, invoices and other
billing information. In addition we found personal banking information, scans of identification documents,
job (and other) applications, legal documents and information about ongoing court cases. The attackers also
exfiltrated personal email communications. All of this information can be leveraged for future attacks, especially
attacks against those within the compromised individual
s social network.
National Security Council Secretariat, India
The National Security Council Secretariat (NSCS) of India is comprised of the Joint Intelligence Committee
and is a component of the National Security Council established in 1998 along with a Strategic Policy
Group and an Advisory Board. The National Security Council is headed by the Prime Minister of India and
is responsible for strategic planning in the area of national security (Subrahmanyam 2010; Indian Embassy
1998). We assess that a computer at the NSCS was compromised based on the documents exfiltrated by the
attackers. During the period in which we monitored the attackers, fourteen documents, including two documents marked
SECRET,
were exfiltrated. In addition to documents containing the personal and financial
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
information of what appears to be the compromised individual, the exfiltrated documents focus on India
security situation in the states of Assam, Manipur, Nagaland and Tripura as well as the Naxalites, Maoists,
and what is referred to as
left wing extremism.
Diplomatic Missions, India
India maintains numerous diplomatic missions abroad that provide consular services relating to passports
and visas as well as faciltaing trade, commerce and engaging in diplomatic relations (Indian government
2010). We assess that computers at the Embassy of India, Kabul, the Embassy of India, Moscow, the
Consulate General of India, Dubai, and the High Commission of India in Abuja, Nigeria were compromised
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
99 documents, including what appears to be one encrypted diplomatic correspondence as well as five documents marked
RESTRICTED
and four documents marked
CONFIDENTIAL,
were exfiltrated. In addition
to documents containing personal, financial, and travel information on embassy and diplomatic staff, the
exfiltrated documents included numerous visa applications, passport office circulars, and country assessments and reports. Confidential visa applications from citizens of Afghanistan, Australia, Canada, the PRC,
Croatia, Denmark, Germany, India, Ireland, Italy, New Zealand, Philippines, Senegal, Switzerland, Uganda,
and the United Kingdom were among the exfiltrated documents.
Military Engineer Services, India
The Military Engineer Services (MES) is a government construction agency that provides services to the
Indian Army, Navy and Air Force. In addition, the MES services the government sector and civil works projects.
We assess that computers at the MES-Bengdubi, MES-Kolkata, MES(AF)-Bangalore, and MES-Jalandhar were
compromised based on the documents exfiltrated by the attackers. During the period in which we monitored
the attackers, 78 documents were exfiltrated. While these documents included manuals and forms that would
not be considered sensitive, they also included documents that contained private information on personnel,
and documents and presentations concerning the financing and scheduling of specific engineering projects.
Military Personnel, India
We assess that computers linked with the 21 Mountain Artillery Brigade in the state of Assam, the Air Force
Station, Race Course, New Delhi and the Air Force Station, Darjipura Vadodara, Gujarat were compromised
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
sixteen documents were exfiltrated. One document contained personal information on Saikorian alumni of
the Sainik School, Korukonda, which prepares students for entry into the National Defence Academy. One
document is a detailed briefing on a live fire exercise while others pertain to surface-to-air missile systems
and moving target indicators.
Military Educational Institutions, India
We assess that computers at the Army Institute of Technology in Pune, Maharashtra and the Military College
of Electronics and Mechanical Engineering in Secunderabad, Andhra Pradesh were compromised based on
the documents exfiltrated by the attackers. During the period in which we monitored the attackers, twentyone documents, including one marked
RESTRICTED
, were exfiltrated. There are documents and presentations detailing the finances of one of the institutions as well as personal and private information on students
and their travel. There is also a document that describes
Project Shakti,
the Indian Army
s command and
control system for artillery (India Defence 2007).
Institute for Defence Studies and Analyses, India
We assess that computers at the Institute for Defence Studies and Analyses (IDSA) were compromised based
on the documents exfiltrated by the attackers. During the period in which we monitored the attackers, 187
documents were exfiltrated. While many of the documents were published papers from a variety of academic
sources, there were internal documents, such as an overview of the IDSA research agenda, minutes of
JR03-2010 Shadows in the Cloud - PART 4: TARGETS & EFFECTS
meetings for the Journal of Defence Studies, budgets and information on a variety of speakers, visitors, and
conference participants.
Defence-oriented publications, India
We assess that computers at the India Strategic defence magazine and FORCE magazine were compromised
based on the documents exfiltrated by the attackers. During the period in which we monitored the attackers,
58 documents were exfiltrated. While these documents include publicly accessible articles and previous
drafts of those articles, there is also private information regarding the contact details of subscribers and conference participants. The documents also include interviews, documents, and PowerPoint presentations from
conferences that detail national security topics, such as network data and monitoring for national security,
and responses to combat cyber threats.
Corporations, India
We assess that computers at YKK India Private Limited, DLF Limited, and TATA were compromised based
on the documents exfiltrated by the attackers. During the period in which we monitored the attackers, five
documents were exfiltrated. These documents include rules overseeing busiiness travel, a presentation on
roadmap and financial status, and an annual plan for a business partnership.
Maritime, India
We assess that computers at the National Maritime Foundation and the Gujarat Chemical Port Terminal
Company Limited were compromised based on the documents exfiltrated by the attackers. During the period
in which we monitored the attackers, 53 documents were exfiltrated. These documents include a summary
of a seminar as well as numerous documents relating to specific shipping schedules, financial matters and
personal medical information.
United Nations