News
Chinese hackers target Indian power grid assets in Ladakh

This report, released earlier this month, details a campaign conducted by a likely Chinese state-sponsored threat activity group targeting the Indian power sector.
The activity was identified through a combination of large-scale automated network traffic analytics and expert analysis. According to the report, this targeting is likely a long-term strategic priority for select Chinese state-sponsored threat actors active within
The prolonged targeting of Indian power grid assets by Chinese state-linked groups offers limited economic espionage or traditional intelligence-gathering opportunities.
"We believe this targeting is instead likely intended to enable information-gathering surrounding critical infrastructure systems or is pre-positioning for future activity," the report said.
The objective for intrusions may include gaining an increased understanding of these complex systems in order to facilitate capability development for future use or gaining sufficient access across the system in preparation for future contingency operations.
In
Following a short lull after the publication of RedEcho reporting, the American firm detected ongoing targeting of Indian power grid organizations by
In recent months, the American firm observed likely network intrusions targeting at least 7 Indian State Load Despatch Centres (SLDCs) responsible for carrying out real-time operations for grid control and electricity dispatch within these respective states.
Notably, this targeting has been geographically concentrated, with the identified SLDCs located in
According to the report, this latest set of intrusions, however, is composed of an almost entirely different set of victim organizations. In addition to the targeting of power grid assets, italso identified the compromise of a national emergency response system and the Indian subsidiary of a multinational logistics company by the same threat activity group.
"To achieve this, the group likely compromised and co-opted internet-facing DVR/IP camera devices for command and control (C2) of Shadowpad malware infections, as well as use of the open source tool FastReverseProxy (FRP)," the report said.
Despite a partial troop disengagement between
While this latest activity displays targeting and capability consistencies with previously identified RedEcho activity, there are also some notable distinctions, the report added. (ANI)
Discussions
No discussions yet. Start a discussion below.
Get Published - Build a Following
The Energy Central Power Industry Network® is based on one core idea - power industry professionals helping each other and advancing the industry by sharing and learning from each other.
If you have an experience or insight to share or have learned something from a conference or seminar, your peers and colleagues on Energy Central want to hear about it. It's also easy to share a link to an article you've liked or an industry resource that you think would be helpful.
Sign in to Participate