By Dr Vinod Surana, Managing Partner & CEO, Surana & Surana International Attorneys
A Singapore based cyber research firm has alerted the Indian cyber agencies about a massive cyber-attack by a Chinese hacking group from June 21, 2020 onwards (Mirror now, 2020). The targets are believed to be ministries, firms, IT sectors and media houses in Delhi, Kolkata, Ahmedabad, Mumbai and Hyderabad. A splurged movement on the dark web, manifesting an increase in aggression by these attackers are noticed post the geopolitical clashes in Galwan at the Ladakh border.
India’s Computer Emergency Response Team (CERT-In) has unfurled red flags against information theft and intellectual property theft by means of an opportunistic phishing attack in view of the pandemic (Chattopadhyay, 2020; Indian Computer Emergency Response Team, 2020). Section 69 of the Information Technology Act, 2000 of India empowers CERT-In to issue directions for monitoring the traffic and decryption of information as required (India code, 2011). These attacks come with an intent to threaten the security, integrity and sovereignty of India, thus introducing contamination to the digital devices as stated under section 66f of the IT Act, 2000 of India (India code, 2011).
The cybercriminals claim to have about 2 billion email id’s belonging to Indian citizens. The Covid-19 situation has already weakened the backbone of the Indian economy as well as had mental implications on many. Remote setups have skyrocketed cyber threat possibilities where users lack critical IT infrastructure and use online tools for team interactions. According to Kaspersky Security Network, India has seen a sudden surge in cyber-attacks by 37% in the beginning of 2020 as compared to the end of the previous year (CisoMag, 2020). Cyber-attacks using Covid-19 as a decoy would cause paramount destruction.
Cybercriminals send phishing emails to potential victims impersonating the decision-makers of the government (figure 1). The content of the email is relevant to the latest updates regarding Covid-19 for example: “free Covid-19 tests” enticing the victim to register. The registration link redirects to a malicious website that collects the user’s sensitive personal information and financial details (Indian Computer Emergency Response Team, 2020). This part of the attack lands the user to a legitimate-looking site in order to avoid suspicion (Lazar, 2018).
Figure 1: How a phishing email gather sensitive information from you (Lazar, 2018).
Similar emails may be backed by Coronavirus-themed malware attachments. When the user downloads this attachment, their device is infected by a malicious code which infiltrates into the system. The malware attack steals the victim’s personal information and has capabilities to spy on the victim without their knowledge (Indian Computer Emergency Response Team, 2020).
The emails are likely to originate from spoofed email id’s resembling “gov.in” domains, example: “email@example.com”. The attacker sends IP packets from a false IP address disguising itself or by targeting the original IP address of the firm and sending packets from the real IP to many others in the network. Spoofed emails are difficult to investigate because the domain often links us to the original website instead of the impersonated. The core email protocols, do not have authentication mechanisms to identify spoofed email ids thereby landing in our mailbox. In 2019, 94% of data breach attacks delivered malware by email (Verizon, 2020).
Various sectors in India have been targeted since 18th June 2020, Maharashtra’s cybersecurity cell reported an upswing of over 40,300 cyber-attack attempts (200% rise) made within just five days (Sahay, 2020). The origin of a major chunk of these attacks stems from Chengdu, capital of China’s Sichuan province. Sichuan is the headquarter for China’s Cyber-warfare. Amongst the many attacks, Distributed Denial of Service (DDoS), IP Hijacking and Phishing are the most prevalent ones. Malware including Crypto miners and Remote Access Tool (RAT) is accompanying the spoofed emails that steal user credentials, captures the screen and exfiltrates data from the victim’s computer.
These resort to activities outlined under Cyber terrorism and has specific provisions covering areas of DDoS attacks, unauthorised access, the introduction of computer contaminant files that has the potential to cause harm to persons, property or data theft (India code, 2011). The Modus Operandi fits in the perimetric definition of Terrorism quoted as “the unlawful use or threatened use of force or violence by a person or an organised group against people or property with the intention of intimidating or coercing societies or governments, often for ideological or political reasons”(Benoji, 2004). The attack is predefined, the targets are specifically set. The objective is to damage target centric entities such as politics or military and defence infrastructure, thereby causing fear amongst people. Under the provisions of the IT Act, 2000, such activities are punishable with imprisonment with a possibility of extension for life (India code, 2011).
The WannaCry ransomware attack shut systems in more than 80 NHS organisations in the UK (2017) making the healthcare vulnerable to handle emergency cases. Data was hijacked and a ransom against the data was demanded (Comptroller and Auditor General, 2018). Similarly, NotPetya attack devastated Merck’s global network via a server in its Ukraine office. It wiped data from the computers of the banks, energy firms, airport and the government draining more than $10 billion overall.
In July 2020, Canada, the UK and the US accused hackers from Russian Intelligence for a cyber-attack with an intention to steal information related to Covid-19 vaccine. During the same time, the UK believed that Russia had attempted to steal and leak documents concerning the UK-US free trade agreement thereby interfering in their 2019 general elections.
In the first quarter of 2020, a group of Chinese hackers targeted 75 industries globally covering every sector of the economy. The Cyber Espionage campaign aimed at establishing backdoors for spying purposes by penetrating into vulnerabilities of Zoho Manage Engine Desktop Central, Cisco RV320 routers and Citrix Application Delivery Controller (ADC) (Scott Ikeda, 2020).
A social engineering attack which began in the Philippines in 2000, later spread to Hong Kong- Europe and the USA in one day. The subject of the email read “ILOVEYOU” and included an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”. This worm infected about 10% of computers that were connected to the internet and a damage of $5.5 billion. Data theft, gaining control over the systems and collecting sensitive information of the internet users were amongst the intentions of the cybercriminal (Nizamettin Aydin).
About 4.1 billion records in the first half of 2019 globally are exposed to the data breach, 71% of these breaches were financially motivated while the remaining intended cyber-espionage (Verizon, 2020). About half of the total breaches came from phishing and social engineering activities. Research reveals that every 39 seconds a hacker attacks a system corresponding to about 2,244 times in one day. State-sponsored cyber-attacks and organised crime hacking activities are on the rise and potentially will see a dramatic increase in the coming five years (Verizon, 2020). It will not only cause damage and exploitation of data but also be responsible for financial thefts, embezzlement, frauds, post-Covid normalcy to business and theft of intellectual property.
Tips to mitigate the risks that you or your company may be exposed to in the cyberspace are as follows: (Directorate General Central Industrial Security Force, 2020; Indian Computer Emergency Response Team, 2020; Larsonus, 2019).
· Do you know who sent the email? (hover on ‘From:’ field to check). Recognize business emails by visiting their websites directly.
· Did the email come from a government agency or law enforcement (It is very unusual)?
· Do not click on any attachments from unexpected emails or from known contacts. Visit the official websites directly through your browser.
· Scan for ‘remove suspicious email attachments. Check for the attachment extension, block the following extensions: ‘.exe, .pif, .tmp, .url, .vb, .vbe, .scr, .reg, .cer, .pst, .cmd and more”.
· Install a pop-up blocker.
· Fact-check with the content in the email using general google search, for example: If the email reads “ ‘Free Covid-19 test for residents of India’, perform a general google search with the same keywords, if the information is true you will find authentic sources, else there will be many links which will alert you.
· Do not share personal information with unnecessary websites, do not register for ‘too good to be true’ offers.
· Update spam filters to keep your device up to date.
· Spelling errors, alignment issues and irregular text are red flags.
· Encrypt the attachments that you send, maintain a good level of privacy while sending emails.
1. Invest in a good antivirus, antimalware, firewall or opt for a complete internet solution. Configure the software to these settings:
· Specify which files and folders to scan regularly, scan for riskware
· Owner (to restrict access to the tool)
· Real-time email scanning and file protection.
· Scan infectable file types (based on file extensions like .exe, .bin, .com etc.)
· Ransomware and self-protection
· Keep your software updated
· Use a strong password with a combination of the following:
At least ONE uppercase alphabet
At least ONE lowercase alphabet
At least ONE numeric
At least ONE special symbols “!@#$%^&*_”
· Do not repeat your passwords.
· Use password managers like KeePass, Dashlane or LastPass.
3. Consider Two-factor authentication wherever possible.
4. Avoid sharing any form of personal information on social media.
5. Use a VPN (Virtual Private Network) to protect your home network. It will encrypt all the traffic leaving your device until it reaches its destination. Paid VPN services are recommended.
6. Verify the payment sources before initiating any transactions online.
Organisations are prone to the threats of a cyber-attack. They must include data ethics, privacy and security as integral elements of their work agenda (Palmer, 2016). Below is a checklist for organisations to prevent a cyber-attack:
Have strong IT policies, back up your data frequently.
An appropriate budget for cybersecurity, this step is often neglected but later repented.
Consult cybersecurity experts around the verticals of your company network.
Identify valuable information that you need to protect, it could range from client data, IPR’s or trade secrets.
Perform critical risk assessments and carry out threat analysis.
Identify the types of cyber-attacks your organisation can be prone to.
Create a backup emergency response plan.
Consider the implementation of tasks to people, identify what happens to the processes and how you can make use of technology to assist during an attack.
Cross-train your employees on areas concerning their privacy, digital security with special attention on the organization’s safety in the cyberspace.
Analyse available information, determine what has happened.
Investigate assets, address unusual problems, recover systems.
Monitor system logs and alerts.
Contain the attack by blocking unauthorised access, malware sources and by isolating systems.
Gather and preserve all retrieved information in different forms: Screenshots, screen recordings, notes, reports etc. Adhere to the guidelines on Computer Evidence laid out by the Association of Chief Police Officers (ACPO, 2012).
Report the incident to relevant stakeholders and service providers.
Conduct a post-incident review.
Investigate more in-depth and identify the attacker, the origins and follow up regularly to avoid relapse of a similar cyber-attack.
Do not panic.
If you have downloaded a suspicious attachment, disconnect from the internet immediately.
Reboot your device by turning it off and on. Press F8, it will open ‘Advanced boot options’ menu.
Choose “Safe mode with Networking” while you remain disconnected from the internet.
Delete temporary files and the downloaded attachment.
Run an antivirus, antimalware scan on your system.
Reboot your PC to normal mode once the virus is removed.
Change your passwords.
Backup your data.
Keep all logs of the conversation, payment receipts etc. for investigation.
Log out from all social media accounts from all devices.
Mark the email ‘spam’, do not open it.
Authorised agencies must follow the NIST guidelines for digital forensic investigations (Kent et al., 2006): Collection, Examination, Analysis and Reporting. One can also opt for IDFPM (M.D. Kohn, M.M. Eloffb, 2013) or the SRDFIM model (Agarwal and Gupta, 2011). Usually in any investigation, all these steps run parallel to each other. It is up to the investigator to strategize which step follows the precursor. Nonetheless, advice the client on basic cybersecurity practices, block financial accounts and try to recover their systems and data.
This step is inclusive of Preparation, Identification, Collection, Packaging and Preservation of evidence.
Carry out a critical assessment of what has happened.
Record case logs, conversational evidence obtained from the victim. Preserve the evidence.
Identify the type and source of attack.
Correlate to similar attacks.
This phase includes responding as well as management of the incident.
Examine the acquired date from the collection phase.
Extract the data as deemed relevant to the case.
Secure the network by implementing temporary firewalls, report to the internet service provider to block traffic or other measures as determined usefUl to block the activities of the cybercriminal.
Perform necessary measures to stop the spread of malicious software.
Conduct network forensics to identify active malware in the client’s environment.
Conduct host forensics to understand how many systems have been compromised.
This phase answers the (5WH) questions about the cyber-incident.
Who did it?
When did it take place?
Where did it happen?
Why did it happen?
How was the incident organized?
Manoeuvre your investigation based on the evidences procured.
Present your investigation findings in a clear and concise format.
Include tools and techniques used from the collection phase until the analysis phase.
Note: If you are a non-governmental investigation agency, it is recommended to report at the local law enforcement. Depending on the kind of loss that has occurred, a First Information Report (FIR) will be required to approach further remediation procedures. It will also help to gather data from similar attacks, formulate statistics and provide a bigger picture of the incident. Perhaps, this step is very essential to make any public notifications regarding the cyber-attack (Crowdstrike).
Individuals and organisations must emphasise on the importance of privacy, data security and safeguard themselves against potential cyber-attacks. Today, the major threat is from the Chinese hackers, tomorrow it will be someone else. This article has stressed on the importance of maintaining cyber hygiene. The tips and checklists provided here form a basic outline of how cyber incidents can be managed.
It is not just the Chinese hackers that pose a threat to our privacy, especially looking at a sharp increase in phishing attacks since January 2020. Every internet user needs to know the basic cyber-security guidelines along with the trending threat landscapes. The damage a cyber-attack can cause is immeasurable. INTERPOL’s Cyber hygiene campaign states that internet users must self-isolate their data, practice social distancing from unknown email senders, avoid contact with any suspicious attachments and always clean their devices (Interpol Cybercrime Directorate, 2020).
ACPO (2012) ‘Association of Chief Police Officers (ACPO) The Good Practice Guide’, Acpo, (March) London, United Kingdom Available at: https://learningedge.edgehill.ac.uk/bbcswebdav/pid-2746223-dt-content-rid-13602935_1/courses/2018_CIS3144/ACPO_Good_Practice_Guide_for_Digital_Evidence_v5.pdf (Accessed: 20 May 2019).
Agarwal, A.A. and Gupta, M.M. (2011) Systematic Digital Forensic Investigation Model.
Benoji, L.M. (2004) Cyber Terrorism., Legal Services India Available at: http://www.legalservicesindia.com/article/1263/Cyber-Terrorism---Quick-glance.html (Accessed: 1 August 2020).
Chattopadhyay, A. (2020) Fact Check: Govt Warning Of Massive Phishing Attack Is Real., The Logical Indian Available at: https://thelogicalindian.com/fact-check/phishing-attack-govt-order-cyber-attack-21897 (Accessed: 8 July 2020).
CisoMag (2020) India Reports 37% Rise in Cyberattacks in the First Quarter of 2020., EC Council Available at: https://cisomag.eccouncil.org/india-reports-37-rise-in-cyberattacks-in-the-first-quarter-of-2020/ (Accessed: 9 July 2020).
Comptroller and Auditor General (2018) Investigation: WannaCry cyber attack and the NHS. London, UK.
Crowdstrike (no date) Cyber Attack Survival Checklist. Njamha.org. Available at: http://www.njamha.org/it/resources/WhitePaper_CyberAttackSurvivalChecklist.pdf (Accessed: 8 July 2020).
Directorate General Central Industrial Security Force (2020) Cyber Alert. New Delhi: Anna University. Available at: https://www.annauniv.edu/pdf/Cyber_Alert_MHA.pdf (Accessed: 8 July 2020).
India code (2011) The Information Technology Act, 2000. India Code. Foundation Books, Delhi, India Available at: 10.1017/UPO9788175968660.018 (Accessed: 4 October 2019).
Indian Computer Emergency Response Team (2020) CERT-In Advisory CIAD-2020-0040., Ministry of Electronics and Information Technology, Govt of India Available at: https://www.cert-in.org.in/ (Accessed: 8 July 2020).
Interpol Cybercrime Directorate (2020) Covid-19 Cyber Threats., Interpol Available at: https://www.interpol.int/en/Crimes/Cybercrime/COVID-19-cyberthreats (Accessed: 8 July 2020).
Kent, K., Chevalier, S., Grance, T. and Dang, H. (2006) NIST SP800-86 Notes. USA: National Institute of Standards and Technology.
Larsonus (2019) Cyber Security Best Practices For Small Businesses in 2020 - 8 Point Checklist., Code mentor Available at: https://www.codementor.io/@googleclone/cyber-security-best-practices-for-small-businesses-in-2020-8-point-checklist-10hcq72hws (Accessed: 9 July 2020).
Lazar, L. (2018) Our Analysis of 1,019 Phishing Kits., Imperva Available at: https://www.imperva.com/blog/our-analysis-of-1019-phishing-kits/ (Accessed: 9 July 2020).
M.D. Kohn, M.M. Eloffb, J.H.P.E. (2013) ‘Integrated digital forensic process model: Library resources’, , pp. 1–13. Available at: http://eds.a.ebscohost.com.ezproxy.leedsbeckett.ac.uk/eds/detail/detail?vid=54&sid=8bdded0a-6b56-4544-83f9-c4dccefbeeb9%40sessionmgr4010&hid=4213&bdata=JnNpdGU9ZWRzLWxpdmUmc2NvcGU9c2l0ZQ%3D%3D#AN=S0167404813000849&db=edselp (Accessed: 5 May 2019).
Mirror now (2020) Singapore based cyber firm alerts Indian agencies of a possible cyber attack by China., The Economic Times, 22 July. Available at: https://economictimes.indiatimes.com/tech/internet/singapore-based-cyber-firm-alerts-indian-agencies-of-a-possible-cyber-attack-by-china/videoshow/76516066.cms?from=mdr (Accessed: 8 July 2020).
Nizamettin Aydin (no date) Introduction to BioInformatics., yildiz Available at: http://www3.yildiz.edu.tr/~naydin/MI2/lectures/PDF/MI2_02.pdf (Accessed: 1 August 2020).
Palmer, M. (2016) Cyber attack survival guide. Financial Times. Available at: https://ig.ft.com/sites/special-reports/cyber-attacks/ (Accessed: 8 July 2020).
Sahay, A. (2020) 40,300 cyber attacks in the last 4-5 days from China, more coming: Maharashtra cyber department., Hindustan Times Available at: https://www.hindustantimes.com/india-news/40-300-cyber-attacks-in-the-last-4-5-days-from-china-more-coming-maharashtra-cyber-department/story-I1ck3vd94dT9mUv6d7vVCM.html (Accessed: 9 July 2020).
Scott Ikeda (2020) Chinese Hackers off to a Busy Start in 2020 With Massive 1Q Cyber Espionage Campaign - CPO Magazine., CPO Magazine Available at: https://www.cpomagazine.com/cyber-security/chinese-hackers-off-to-a-busy-start-in-2020-with-massive-1q-cyber-espionage-campaign/ (Accessed: 1 August 2020).
Verizon (2020) Data Breach Investigations Report. Available at: https://enterprise.verizon.com/resources/reports/2020-data-breach-investigations-report.pdf (Accessed: 1 August 2020).