Indian Defence Cyber Agency & Defence Space Agency : Updates and Discussions

Why not when PM and DM are using it?

What else can you expect when people in NIC are holding posts of directors and JS, a few are for IIT as well are big time ghonchus, at max what they do is, instal wlan and softwares on a pc.

The real guys are outsourced by them but these ghonchus due to their superiority complex don't listen to these boys who are robust in networking and software development. These boys working on contract basis for just 10k to 20k. Wasting their talent in NIC.
 
What else can you expect when people in NIC are holding posts of directors and JS, a few are for IIT as well are big time ghonchus, at max what they do is, instal wlan and softwares on a pc.

The real guys are outsourced by them but these ghonchus due to their superiority complex don't listen to these boys who are robust in networking and software development. These boys working on contract basis for just 10k to 20k. Wasting their talent in NIC.
_111510760_mediaitem111507795.jpg


:cautious:
 

If you are getting a photograph of the meeting this means that it was not a confidential meeting. Unfortunately, in India nothing is confidential.
---------------------------------------------------------------------------------------------------------------------------------------------------------------

Zoom claims to use TLS 1.2 with Advanced Encryption Standard 256-bit (AES-256) for the Zoom client. In details, Zoom uses TLS 1.2 with AES-256 to protect signaling, and uses AES-128 to protect audio and video streams. [67]Zoom claims to use "end-to-end encryption" in its marketing materials,[68] but later clarified it meant "from Zoom end point to Zoom end point" (meaning effectively between Zoom servers and Zoom clients), which is misleading and has been described as "dishonest".[69] Citizenlab researchers also discovered that in reality a single, server-generated AES-128 key is being shared between all participants in ECB mode, which is deprecated due to its pattern-preserving characteristics of the ciphertext. During test calls between participants in Canada and USA the key was provisioned from servers located in China.
-------------------------------------


This is the reason I don't use made in china phone, it manufactured some where else ;)
 
Zoom platform unsafe, says Centre; issues guidelines on secure use

Zoom platform unsafe, says Centre; issues guidelines on secure use

The government on Thursday said that the Zoom Meeting platform is not safe and issued an advisory on its secure use. The advisory also stated that the platform is not for use by government officers/officials for official purposes.
“The document makes reference to earlier advisories of the Indian Computer Emergency Response Team (Cert-In) and states that Zoom is not a safe platform. The guidelines have been issued to safeguard private individuals who would still like to use the platform for private purposes,” Cyber Coordination Centre (CyCord), under the Union Ministry of Home Affairs (MHA), said in a statement.
The broad objective of the advisory is to prevent any unauthorised entry into a Zoom Conference Room and prevent an unauthorised participant from carrying out malicious attacks on the terminals of other users in the conference, it said.
The statement said that individuals and organisations may also refer to the advisories by Cert-In published on February 6 and March 30. These advisories are also available on Cert-In website. And, those private individuals who still would like to use Zoom for private purpose should follow the guidelines.

;)
 
i follow the guy posted in twitter closely becoz my professional life related to cyber security, by the way the guy never mentioned the nuclear power plant he tweeted abt a unique hard coded command line which have username and password defined also an internal IP address of that net work,the username was controler//KKNPP which may be a short for kudankulam nuclear Power plant, even though the virus submition happened from India that's why I said it may not be a sol propaganda ,we can't take everything blindly said by authorities they said same abt Aadhar when hackers showed 3tb data gov said it was secured by 10feat Wall, yes am aware that. the kudankulam plant was standalone it don't have any Internet or intranet connection but stux net(aka op Olympic games) attacked Iran infected through a pendrive, air gaped ( systems not connected to internet net) not fully secured from hackers,
What's the aadhar hack you are talking about? AFAIK the CIDR hasn't been breached ever but the third parties which store aadhar info have been hacked like the mobikwik but that obviously isn't the same.
 
  • Like
Reactions: Paro
Group IB report highlights cyberspace weaponisation in 2019. India is at it too

By Nirmal John
Dec 04, 2019, 03.22 PM IST


The report talks about Lazarus, a North Korean sponsored group, hitherto known for its attacks on financial services companies, targeting an Indian energy facility. (likely the Kudankulam Nuclear Power plant, although the report doesn’t specify it)

It is nearly 2020 and the fear of a global digital dystopia is increasingly becoming real.

A newly released report from Singapore-based threat-intelligence firm Group IB underlines what has been brewing in cybersecurity over the last few years — the dominance of the nation state as the primary threat actor.

“The leading and most frightening trend of 2019 was the use of cyber-weapons in military operations,” the report says.

It says that there were 38 groups of state-sponsored attackers that were active over the last one year, with seven of these being new cyber-espionage groups whose activities were discovered this year.

Two of these groups, the report says, were sponsored by the Indian state and are called BITTER and Sidewinder. Both of these groups were primarily active in the Apac region, but further details remain unpublished.

Talking to The Economic Times, the founder and chief executive Ilya Sachkov stressed the need for multilateral dialogue and cooperation to address the growing weaponisation of cyberspace.

The report says that the use of cyberweapons and its real-world impact has become all too real with three incidents in particular — the cyber sabotage of the Simon Bolivar Hydroelectric plant and the resultant blackout in Venezuela in March; the US cyberattack on the Iranian Revolutionary Guards in June; and the Israeli missile strike on a building in the Gaza Strip, allegedly used by Hamas hackers to carry out cyberattacks.

The report also highlights an increased volume of attacks targeting the telecommunications and energy sectors. It also talks about Lazarus, a North Korean sponsored group, hitherto known for its attacks on financial services companies, targeting an Indian energy facility (likely the Kudankulam Nuclear Power plant, although the report doesn’t specify it), indicating their “military’s growing interest in this type of attack”.

The US, Russia, North Korea, Pakistan, China, Vietnam, Iran, UAE, Turkey, and South America were the other regions from where state-sponsored attacks are believed to have originated.

Group IB is forecasting the situation to worsen further with possible attack scenarios, including cutting connectivity in a country completely and attacks on domain-name registrars. Things could get especially bad for the telecommunication sector, with the advent of 5G and the increase in the number of connected devices.

Group IB CTO and co-founder of Dmitry Volkov says the findings of the reports must make everyone in cybersecurity review their threat models. “Attribution is never easy, but it is always possible to attribute attacks based on the knowledge you have,” he added.

The report is the result of Group IB’s own threat intelligence, combined with threat intelligence from other cybersecurity companies.

Group IB report highlights cyberspace weaponisation in 2019. India is at it too