- News>
- Technology
China-backed hackers spying on govts, India`s NIC among victims
The China-based hacking group targeted individuals via emails containing abasic PDF files with links to the phishing sites, typically stating that a user needs to click the link to preview or download files. Over the past three years, RedAlpha continued to conduct credential-phishing activity using large clusters of operational infrastructure to support campaigns.
Highlights
- China backed hackers are attacking government institutions.
- Hackers are stealing the login credentials of the institutions.
- The hacking group weaponised some least 350 domains last year alone.
New Delhi: A hacking group allegedly backed by the Chinese government has been attacking governments, NGOs, news publications and think tanks globally -- including India's National Informatics Centre (NIC) -- sending them emails which, once opened, were used to steal their login credentials. The group known as 'RedAlpha' has consistently spoofed login pages for NIC, which manages wider IT infrastructure and services for the Indian government. The hacking group weaponised some least 350 domains last year alone.
The China-sponsored hacking group spoofed organisa of tions such as the International Federation for Human Rights (FIDH), Amnesty International, the Mercator Institute for China Studies (MERICS), Radio Free Asia (RFA), the American Institute in Taiwan (AIT), and other global government, think tank, and humanitarian organisations that "fall within the strategic interests of the Chinese government". (Also Read: Sovereign Gold Bond Scheme opens today: 5 day window to buy gold at low prices)
According to a report by cybersecurity firm Recorded Future, the group has also engaged in direct targeting of ethnic and religious minorities, including individuals and organisations within Tibetan and Uyghur communities. "In recent years RedAlpha has also displayed a particular interest in spoofing political, government, and think tank organisations in Taiwan, likely in an effort to gather political intelligence," said the report. (Also Read: New Wage Code: CRUCIAL meeting today, discussion on allowance, pay structure)
The China-based hacking group targeted individuals via emails containing abasic PDF files with links to the phishing sites, typically stating that a user needs to click the link to preview or download files. Over the past three years, RedAlpha continued to conduct credential-phishing activity using large clusters of operational infrastructure to support campaigns.
"In late 2019 and early 2020, the group likely shifted away from older infrastructure TTPs exhibited in public reporting, such as the registration of domains through GoDaddy and hosting on Choopa (Vultr) and Forewin Telecom infrastructure," the report revealed. The researchers observed RedAlpha consistently register domains spoofing Taiwanese or Taiwan-based government, think tank, and political organisations.
"Notably, this included the registration of multiple domains imitating the American Institute in Taiwan (AIT), the de facto embassy of the United States of America in Taiwan, during a time of increasing US-China tension regarding Taiwan over the past year," they said. RedAlpha's activity has expanded over the past several years to include credential-phishing campaigns spoofing ministries of foreign affairs in multiple countries. A Chinese government spokesperson told the MIT Technology Review that the country opposes all cyberattacks and would "never encourage, support, or connive" to carry out such activity.