Indian

now browsing by tag

 
 

#deepweb | Indian authorities arrest their first crypto dark web drug dealer

Source: National Cyber Security – Produced By Gregory Evans

  • The suspect, Dipu Singh, is accused of selling psychotropic and prescription pills on the dark web.
  • He was taken into custody by the central anti-narcotics agency under the Narcotic Drugs and Psychotropic Substances (NDPS) Act.

In an investigation done by the Narcotics Control Bureau (NCB), India has caught its first darknet crypto drug dealer. The authorities have seized 55,000 tablets in the arrest. The NCB participated in “Operation Trance” – a multinational crackdown on illicit dark web drug sales using couriers, international postal services, and private parcel deliveries.

Global post offices and international courier services were used as logistics for illicit trade. The payments gateways of cryptocurrency were used by the operators to conceal the transactions from law enforcement agencies.

The accused, Dipu Singh, is a 21-year old whose father is a retired army officer. Singh is accused of selling many psychotropic and prescription pills on the dark web and shipping them to the US, Romania, Spain, and other countries.

He started out by selling health supplements and erectile dysfunction medication on major dark web markets. Later, he began selling tramadol, zolpidem, alprazolam and other psychotropic prescription medications. The suspect was taken into custody by the central anti-narcotics agency under the Narcotic Drugs and Psychotropic Substances (NDPS) Act. 

 

Source link
——————————————————————————————————

The post #deepweb | <p> Indian authorities arrest their first crypto dark web drug dealer <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Joker’s laughing: Fresh database of half a million Indian payment card records on sale in the Dark Web

Source: National Cyber Security – Produced By Gregory Evans

“INDIA-BIG-MIX” (full name: [CC] INDIA-BIG-MIX (FRESH SNIFFED CVV) INDIA/EU/WORLD MIX, HIGH VALID 80-85%, uploaded 2020-02-05 (NON-REFUNDABLE BASE)”

If you’re wondering what this seemingly random set of words mean, that is how a fresh database of 461,976 payment card records currently on sale on Joker’s Stash, a popular underground cardshop in the dark web has been listed.

Group-IB, a Singapore based cybersecurity company specialising in preventing cyber attacks which detected the database, says that over 98% of this database on sale were cards issued by Indian banks.

At the moment, the source of this new breach is unknown. The card records were uploaded on the 5th of February and that the total estimated value of the database according to Group-IB, is USD4.2 million, at around USD 9 apiece. Till yesterday morning 16 cards details were found to have been sold. Those who buy these cards do so with the intention of committing payment card fraud.

The company says that they have already alerted India’s Computer Emergency Response Team (CERT-In). The Economic Times will update this story as and when we hear from CERT-In on the steps they have taken.

With the sharp rise in digital payments in India and a lack of corresponding rise in awareness of the best practices to use payment cards safely online and offline, the country has become an attractive destination for nefarious elements online.

This newest breach has, according to Group-IB, “exposed card numbers, expiration dates, CVV/CVC codes and, in this case, some additional information such as cardholders’ full name, as well as their emails, phone numbers and addresses.”

This is the second major database of Indian payment card details that Group-IB has detected since October when 1.3 million credit and debit card records of mostly Indian banks’ customers uploaded to Joker’s Stash with and estimated underground market value of USD130 million was detected in what became “the biggest card database encapsulated in a single file ever uploaded on underground markets at once.”

According to Dmitry Shestakov, the head of Group-IB cybercrime research unit, “In the current case, we are dealing with so-called fullz — they have info on card number, expiration date, CVV/CVC, cardholder name as well as some extra personal info.”

They also say that unlike earlier breaches what “distinguishes the new database from its predecessor is the fact that the cards were likely compromised online, this assumption is supported by the set of data offered for sale.”

Shestakov adds “such type of data is likely to have been compromised online — with the use of phishing, malware, or JS-sniffers — while in the previous case, we dealt with card dumps (the information contained in the card magnetic stripe), which can be stolen through the compromise of offline POS terminals, for example.”

Source link
——————————————————————————————————

The post #deepweb | <p> Joker’s laughing: Fresh database of half a million Indian payment card records on sale in the Dark Web <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Indian Government Emails Found Wandering on the Dark Web

Source: National Cyber Security – Produced By Gregory Evans

  • Hundreds of email IDs and plaintext passwords belonging to Indian organizations are available on the dark web.
  • The emails may have been shared among crooks for quite some time, but this has just been discovered.
  • It is time for crucial government entities to use 2FA, and even better, 2SV physical security keys.

Researcher Sai Krishna Kothapalli has found 3202 email IDs on the dark web, belonging to people working on the Indian government and various organizations of the state. The infosec expert has been collecting data from dumps on the dark web for the past four years, creating a humongous database of 1.8 billion email IDs and passwords. According to him, approximately 85% of the passwords he holds are in plain text form, while others have been dehashed by hackers throughout the years. After analyzing this trove of data, Kothapalli recently found some ending with “.gov.in”.

The 365 email IDs belong to employees of the ‘Indira Gandhi Centre for Atomic Research’. Trailing just behind is the ‘Bhabha Atomic Research Centre’ with 325 email IDs. In third place, there is the ‘Securities and Exchange Board of India’ with 157 emails. In total, the 3202 emails belonging to 12 entities, as shown in the graph below.


india_graph

The researcher tried to correlate his findings with the “Have I Been Pwned” service and found no entries there, so this was a fresh discovery. The conclusion that he drew was that this data must be the product of a targeted phishing campaign since there were no recorded breaches. This means that the employees who have had their IDs and passwords stolen could be at risk of having their accounts taken over. The employees could have changed their passwords in the meantime, but the chances of stuffing attacks against other accounts belonging to the same people remain high.

The researcher is still investigating the data and is in the process of contacting the governmental organizations to alert them about his findings. He points out that when he started investigating this, he was approached by someone who posed as an NDTV reporter. After additional research, he discovered that the email accounts used to contact him had been compromised in the previous months and that the news from back in the time attributed this to North Korean hackers.

So, could this all be the work of state-supported actors from North Korea? It’s quite possible, but nothing can be said with certainty until the investigation is concluded. Right now, the important part is to secure the email accounts by resetting the credentials as soon as possible. Also, and as the researcher points out in his report, it is high time for the government and its organizations to adopt two-factor authentication for the email accounts of their employees, or even better, physical security keys.

Source link
——————————————————————————————————

The post #deepweb | <p> Indian Government Emails Found Wandering on the Dark Web <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cyberfraud | #cybercriminals | Many ups and downs for Karnataka Police this year- The New Indian Express

Source: National Cyber Security – Produced By Gregory Evans Express News Service The year 2019 saw many ups and downs for the State Police. Early into the year the police faced severe embarrassment when one senior officer complained against another for illegally tapping his phone calls and soon the issue snowballed into a major political […] View full post on AmIHackerProof.com

#deepweb | Cops to leave druggies high and dry on NYE- The New Indian Express

Source: National Cyber Security – Produced By Gregory Evans Express News Service BENGALURU: With Bengalureans all set to welcome the new year, with some heading to discos, pubs, restaurants or farmhouses on the outskirts of the city, the police have upped vigilance to curb drug abuse at parties. The Central Crime Branch (CCB), on Tuesday, nabbed […] View full post on AmIHackerProof.com

#comptia | #ransomware | Indian corporate sector sees rising ransomware attacks

Source: National Cyber Security – Produced By Gregory Evans

As per Kaspersky, three groups of ransomware are most active in India.

 

New Delhi: Ransomware attacks have increased manifold during the last year and according to global cyber security group Kaspersky’s data, ransomware attacks across the globe has seen an increase of 60% in 2019 compared to 2018.

Municipalities have been the biggest targets for ransomware attacks in 2019, and Kaspersky data reveals that around 174 municipal institutions along with 3,000 of its subset organisations have been targeted by ransomware in 2019.

The ransomware demands from the attacked institutions or corporates range from $5,300,000 and $1,032,460 on average and researchers say that these figures do not accurately represent the final costs of an attack, as the long-term consequences are far more devastating.

One of the major ransomware attacks which was faced in 2019 was in Baltimore in the United States where officials encountered a ransomware called RobbinHood that encrypted a number of municipal computers, and completely paralysed some city services. The malware had disabled about 10,000 devices and extortionists demanded 13 bitcoins which cost about $114,000 to decrypt the computers.

India has not been far behind and during 2019, the Indian corporate sector faced a number of ransomware attacks. According to Kaspersky’s research group, three groups of ransomware—Ryuk, Purga and Stop—have been the most active and notorious ransomware active in India.

Among these three ransomware active in India, the Stop ransomware had caused about 10.10% of the total ransomware attacks in India, followed by Ryuk which was responsible for about 5.84% attacks and Purga was responsible for 0.80% ransomware attacks.

The mechanism behind how these ransomware operate is quite simple—they turn the files on victims’ computers into encrypted data and demand a ransom for the decryption keys. These keys are created by threat actors to decipher the files and transform them back into the original data. Without a key, it is impossible to operate the infected device. The malware may be distributed by the creators of the threat, sold to other actors or to the creators’ partner networks, “outsourced” distributors that share the profit from successful ransomware attacks with the technology holders.

However, according to Kaspersky researchers to avoid malware infestation and ransomware attacks It is essential to install all security updates as soon as they appear.

Most cyber attacks are possible by exploiting vulnerabilities that have already been reported and addressed, so installing the latest security updates lowers the chances of an attack. They also advice to protect remote access to corporate networks by VPN and use secure passwords for domain accounts and to have fresh back-up copies of all files so that one can replace them in case they are lost.

Source link

The post #comptia | #ransomware | Indian corporate sector sees rising ransomware attacks appeared first on National Cyber Security.

View full post on National Cyber Security

#deepweb | Stellar Indian American Engineers Among the Latest Group of IEEE Fellows | Global Indian

Source: National Cyber Security – Produced By Gregory Evans The Institute of Electrical and Electronics Engineers recently announced its 2020 IEEE Fellows, with numerous Indian American and South Asian-origin engineers making the cut. IEEE Fellowships are conferred by the IEEE Board of Directors upon a person with an outstanding record of accomplishments. The total number […] View full post on AmIHackerProof.com

#deepweb | Indian web shows get set for the next level

Source: National Cyber Security – Produced By Gregory Evans

Indian web shows get set for the next level

New Delhi, Nov 24 (IANS) “Sacred Games”, starring Saif Ali Khan and Nawazuddin Siddiqui, was brought back by Netflix India this year owing to the huge success of season one. The crime thriller isn”t the only Indian web show that got renewed for a new season. There are other shows that have cleared the “acid test of content”, too.

The big question for all OTT shows returning with new seasons is: Will these taste the success of their first parts? Or, will these underwhelm, as the new season of “Sacred Games” did earlier this year?

Soon after “Sacred Games 2” premiered in August, it led to divided reactions among netizens. Many memes comparing both the seasons flooded the Internet. Those disappointed with the second season of the series went on to use images of old and torn clothes, broken cars, and stills from “Games Of Thrones” to express themselves.

Cricket-themed “Selection Day”, focusing on the stories of Radha and Manju, returned to Netflix in April. Some found it just “okay”, others thought the drama was inspiring.

Despite a few shows not living up to expectations in their new seasons as compared to original ones, follow-ups are happening in the OTT world aplenty.

Amazon Prime is also bringing back some of its hit shows — “Inside Edge” being one of them, and its actress Richa Chadha has promised her fans that the new season has a much more gripping and power-packed storyline.

“My character Zarina Malik has transformed very interestingly since the first season. In the first season, Zarina tried to do things in a rightful manner but she faced a lot of obstacles. Now she is questioning herself, as to why this is happening, why she is doing this, while it only puts her in trouble. The character goes into that tussle over going into the dark side of matters,” Richa had told IANS.

“Breathe 2″ is another show the viewers are eagerly waiting for, not only because of its content but also because it will be actor Abhishek Bachchan”s foray into the digital space.

“Mirzapur 2”, starring Pankaj Tripathi and Ali Fazal, is expected to arrive in 2020. “Four More Shots Please 2″ and Zoya Akhtar”s “Made in Heaven 2” have also been announced.

The trend of renewals can be seen on Ekta Kapoor”s ALTBalaji too.

“We believe that sequels (new seasons) are the acid test of the content. Sequels are made only when the content is successful and one has to create further pull and push on the sequel for it to be even more powerful than the first season,” an ALTBalaji spokesperson told IANS.

“We have around 50 original web series and the highest number of sequels for them so far, starting with the critically-acclaimed ”Broken…But Beautiful”, on November 27, which depicted the journey of Veer and Sameera and their life of heartbreak.”

Another show on ALTBalaji, which has left behind a legacy is “Ragini MMS”.

“After the resounding success of the first season, we are now launching an even more intriguing second season that features the Internet sensation and audience”s favourite couple Varun Sood and Divya Agarwal. Adding to the hype and frenzy and ensuring we break the Internet, the franchise will have a special item number ”Hello Ji!” featuring none other than gorgeous Sunny Leone,” shared the spokesperson.

Other shows in the pipeline, which are set for a new season are “Kehne Ko Humsafar Hain season 3”, “Baarish 2”, “PuncchBeat 2” and “Gandii Baat Season 4”.

Speaking about the upcoming new seasons of their shows, the characters that “we have introduced through our shows have created a strong impression on viewers. We aim to build on this legacy while adding more interesting elements to keep them current and relevant,” said the ALTBalaji spokesperson.

–IANS

nn/vnc/bc


Disclaimer :- This story has not been edited by Outlook staff and is auto-generated from news agency feeds. Source: IANS


More from Outlook Magazine

Source link
——————————————————————————————————

The post #deepweb | <p> Indian web shows get set for the next level <p> appeared first on National Cyber Security.

View full post on National Cyber Security

#cybersecurity | #hackerspace | Analyst Discusses Reporting Hack Of Computer System At Indian Nuclear Reactor | Avast

Source: National Cyber Security – Produced By Gregory Evans This week a report of hackers gaining access to an Indian nuclear power plant’s computer network led to alarm, confusion, and denial before officials admitted the hack took place. The threat analyst who reported the issue experienced a unique vantage point in the middle of that […] View full post on AmIHackerProof.com

#infosec | North Korean Malware Found at Indian Nuke Plant

Source: National Cyber Security – Produced By Gregory Evans

A malware infection at one of India’s nuclear power plants has been confirmed by its owner, with researchers speculating that it is North Korean in origin.

News began circulating on social media earlier this week that the Kudankulam Nuclear Power Plant (KNPP) may have been hit by an attack. A third party contacted cyber-intelligence analyst Pukhraj Singh who in turn notified the country’s National Cyber Security Coordinator on September 3, he said.

He added that the malware in question was later identified by Kaspersky as Dtrack.

Although initially KNPP officials said an attack on the plant was “not possible,” they changed their tune in a letter dated Wednesday.

The government-owned Nuclear Power Corporation of India (NPCIL) released a statement saying the original reports had been correct, and handled by CERT-In when the organization was notified on September 4.

“The investigation revealed that the infected PC belonged to a user who was connected in the internet connected network used for administrative purposes,” it clarified. “This was isolated from the critical internal network. The networks are being continuously monitored. Investigation also confirms that the plant systems are not affected.”

Dtrack was first revealed in late September by Kaspersky as linked to the infamous Lazarus Group. It discovered over 180 samples of the malware, which is said to take advantage of weak network security, password management and a lack of traffic monitoring to deploy information stealing and remote access capabilities to victim systems.

It’s unclear what the attacker’s goals were in this raid — whether it was an accidental infection, a deliberately targeted multi-stage IP-stealing mission, or something more sinister still.

However, at the time of discovery, Singh tweeted about a causus belli (act of war) in Indian cyberspace. He later clarified this was a reference to a second, as-yet-unnamed, target.

“Actually, the other target scared the sh*t out of me. Scarier than KKNPP in some ways,” he said.

____________________________________________________________________________________________________________________

#infosec #itsecurity #hacking #hacker #computerhacker #blackhat #ceh #ransomeware #maleware #ncs #nationalcybersecurityuniversity #defcon #ceh #cissp #computers #cybercrime #cybercrimes #technology #jobs #itjobs #gregorydevans #ncs #ncsv #certifiedcybercrimeconsultant #privateinvestigators #hackerspace #nationalcybersecurityawarenessmonth #hak5 #nsa #computersecurity #deepweb #nsa #cia #internationalcybersecurity #internationalcybersecurityconference #iossecurity #androidsecurity #macsecurity #windowssecurity
____________________________________________________________________________________________________________________

Source link

The post #infosec | North Korean Malware Found at Indian Nuke Plant appeared first on National Cyber Security.

View full post on National Cyber Security