Trending

#indiangovernment

Latest posts tagged with #indiangovernment on Bluesky

Latest Top
Trending

Posts tagged #indiangovernment

Preview
Cross-Platform Spyware Campaigns Target Indian Defense and Government Sectors   Cybersecurity researchers have identified multiple coordinated cyber espionage campaigns targeting organizations connected to India’s defense sector and government ecosystem. These operations are designed to infiltrate both Windows and Linux systems using remote access trojans that allow attackers to steal sensitive information and retain long-term control over compromised devices. The activity involves several spyware families, including Geta RAT, Ares RAT, and DeskRAT. These tools have been associated in open-source security reporting with threat clusters commonly tracked as SideCopy and APT36, also known as Transparent Tribe. Analysts assess that SideCopy has operated for several years and functions as an operational subset of the broader cluster. Rather than introducing radically new tactics, the actors appear to be refining established espionage techniques by expanding their reach across operating systems, using stealthier memory-resident methods, and experimenting with new delivery mechanisms to avoid detection while sustaining strategic targeting. Across the campaigns, initial access is commonly achieved through phishing emails that deliver malicious attachments or links to attacker-controlled servers. Victims are directed to open Windows shortcut files, Linux executables, or weaponized presentation add-ins. These files initiate multi-stage infection chains that install spyware while displaying decoy documents to reduce suspicion. One observed Windows attack chain abuses a legitimate system utility to retrieve and execute web-hosted malicious code from compromised, regionally trusted websites. The downloaded component decrypts an embedded library, writes a decoy PDF file to disk, contacts a command-and-control server, and opens the decoy for the user. Before deploying Geta RAT, the malware checks which security products are installed and modifies its persistence technique accordingly to improve survivability. This method has been documented in public research by multiple security vendors. Geta RAT enables extensive surveillance and control, including system profiling, listing and terminating processes, enumerating installed applications, credential theft, clipboard manipulation, screenshot capture, file management, command execution, and data extraction from connected USB devices. Parallel Linux-focused attacks begin with a loader written in Go that downloads a shell script to install a Python-based Ares RAT. This malware supports remote command execution, data collection, and the running of attacker-supplied scripts. In a separate infection chain, DeskRAT, a Golang-based backdoor, is delivered through a malicious presentation add-in that establishes outbound communication to retrieve the payload, a technique previously described in independent research. Researchers note that targets extend beyond defense to policy bodies, research institutions, critical infrastructure, and defense-adjacent organizations within the same trusted networks. The combined deployment of Geta RAT, Ares RAT, and DeskRAT reflects a developing toolkit optimized for stealth, persistence, and long-term intelligence collection.

Cross-Platform Spyware Campaigns Target Indian Defense and Government Sectors #cyberespionage #deskrat #IndianGovernment

0 0 0 0
Video

Live TV on your phone without internet.

India has cleared Direct-to-Mobile (D2M) broadcasting, aiming to expand access to content across 800M+ smartphone users.

#DeccanFounders #D2M #DirectToMobile #IndiaTech #MediaTech #DigitalIndia #TechNews #Broadcasting #Telecom #IndianGovernment

0 0 0 0
Preview
Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities Gopher Strike used phishing emails read more about Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities

Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities reconbee.com/experts-dete...

#Pakistan #Pakistani #cybercampaigns #indiangovernment #cyberattack

0 0 0 0

#DRDO #AI #Validation #Verification #Defence #Research #Quality #Innovation #AtmanirbharBharat #India #IndianGovernment #DigitalEngineering #Engineering #HughesSystique #HSC
3/3

0 0 0 0
Preview
Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia Transparent Tribe has used recently read more about Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia

Transparent Tribe Launches New RAT Attacks Against Indian Government and Academia reconbee.com/transparent-...

#transparenttribe #RAT #remoteaccesstrojan #cyberattack #cybersecurity #indiangovernment #academia

0 0 0 0
Post image

The #IndianGovernment scrapped an order for smartphone makers to preload a cybersecurity app after backlash from politicians and privacy advocates.

https://ow.ly/3Tvb50XBiPJ

#SancharSaathi #SancharSaathiApp #Privacy #Cybersecurity #DataPrivacy #TechPolicy

0 0 0 0
Post image

#India has ordered smartphone makers to pre-install a government-run cybersecurity app that cannot be removed, a move that has raised concerns about users' privacy.

https://ow.ly/t5yL50XAHMX

#CyberSecurity #PrivacyConcerns #IndianGovernment #SancharSaathi

0 0 0 0
Preview
India Notifies DPDP Rules 2025: A New Dawn for Digital Privacy Rights - Although the DPDP Rules will become fully operational 18 months from now, their notification signals a shift in digital governance

India Notifies DPDP Rules 2025: A New Dawn for Digital Privacy Rights wiobs.com/india-notifi... #DPDP #DataProtectionIndia #DigitalPrivacy #IndianGovernment #DataSecurity

0 0 0 0
Preview
APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign (Bharat Operating System Solutions) Linux computers read more about APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign

APT36 Targets Indian Government with Golang-Based DeskRAT Malware Campaign reconbee.com/apt36-target...

#APT36 #Indiangovernment #government #golangmalware #DeskRATmalware #malwarecampaign #malwareattack

0 0 1 0

3/7
This is a major step in normalizing a relationship shattered in 2023.

Ties were frozen after then-PM Justin #Trudeau stood in the House of Commons and presented "credible allegations" linking the #IndianGovernment to the #assassination of Canadian #Sikh leader #HardeepSinghNijjar in #B.C.

3 0 1 0
Post image

PMFAI India urges government action against US tariff shock affordable-and-user-friendly-msds-software.com/pmfai-india-... Image: AI-generated #india #chemicalsinindia #indiachemicals #ChemicalIndustryIndia #PMFAI #indiangovernment #tariffs #UnitedStates #usa #tradebarrier #chemicalsectorindia

0 0 0 0
Post image

PMFAI India urges government action against US tariff shock affordable-and-user-friendly-msds-software.com/pmfai-india-... Image: AI-generated #india #chemicalsinindia #indiachemicals #ChemicalIndustryIndia #PMFAI #indiangovernment #tariffs #UnitedStates #usa #tradebarrier #chemicalsectorindia

0 0 0 0
Preview
Transparent Tribe Target Indian Government's Custom Linux OS with Weaponized Desktop Files  Transparent Tribe, a cyber-espionage group believed to originate from Pakistan and also known as APT36, has stepped up its attacks on Indian government entities by using malicious desktop shortcuts designed to compromise both Windows and BOSS Linux systems.  The latest tactics involve spear-phishing emails featuring fake meeting notices. These emails contain desktop shortcut files disguised as PDF documents (e.g., “Meeting_Ltr_ID1543ops.pdf.desktop”). When recipients attempt to open what appears to be a typical PDF, they instead activate a shell script that initiates the attack chain.  The malicious script fetches a hex-encoded file from an attacker-controlled domain (“securestore[.]cv”), decodes it to an ELF binary, and saves it to the target computer's disk. During this process, the victim is shown a decoy PDF hosted on Google Drive, launched in Firefox, to avoid suspicion. The dropped Go-based ELF binary then connects to a command-and-control (C2) server (“modgovindia[.]space:4000”), allowing attackers to issue commands, deliver additional malicious payloads, and steal sensitive data.  Transparent Tribe’s campaign ensures persistence by setting up a cron job that automatically runs the main payload after reboots or process terminations. The malware is equipped with reconnaissance capabilities and includes dummy anti-debugging and anti-sandbox techniques to dodge detection by analysts and automated analysis platforms. A known backdoor associated with the group, Poseidon, is deployed for deeper intrusion. Poseidon enables long-term access, data exfiltration, credential theft, and lateral movement within compromised environments.  CloudSEK and Hunt.io, two cybersecurity firms, reported that this sophisticated campaign reflects APT36’s ongoing adaptation—modifying attacks based on the victim's operating system to maximize the success rate and persistence.  In recent weeks, similar attacks by Transparent Tribe targeted Indian defense organizations using spoofed login pages intended to collect credentials and two-factor authentication (2FA) codes, especially the Kavach 2FA system widely adopted within Indian government agencies.  The phishing pages, designed to closely resemble official Indian government sites, prompt users to enter both their email credentials and Kavach code. Typo-squatted domains and Pakistan-based infrastructure are consistently used, aligning with the group’s established tactics.  Recent campaigns have also targeted countries such as Bangladesh, Nepal, Pakistan, Sri Lanka, and Turkey using spear-phishing emails that mimic governmental communication and leverage lookalike pages for credential theft. Another South Asian group, SideWinder, has employed similar techniques, using fake Zimbra and portal pages to gather government users’ login information, illustrating the widespread threat landscape in the region.

Transparent Tribe Target Indian Government's Custom Linux OS with Weaponized Desktop Files #CyberAttacks #IndianGovernment #LinuxOS

0 0 0 0
The Dark Secret Behind Delhi’s 1 Million Stray Dogs Crisis – Why They're In trouble(I Saw It Myself)
The Dark Secret Behind Delhi’s 1 Million Stray Dogs Crisis – Why They're In trouble(I Saw It Myself) YouTube video by Happy Doggo

youtu.be/6wgTYH6Te20?...
When Niall Harbison thinks animal abuse and cruelty is bad we all need to pay attention. #IndianGovernment state sponsored animal abuse. Murdered, surgery without anaesthetic, beaten, tortured and dumped. Activists ignored and physically attacked. India is better than this.

1 0 1 0
Preview
Indian government plans ban on money-based online games citing numerous concerns India's massive online gaming market to face blanket ban under a new government bill. India is currently home of the world's largest online money gaming industry.

Indias massive online gaming market to face blanket ban under a new government bill.
#FantasyBan #FantasyGames #IndianGovernment #OnlineGames #ThePromotionAndRegulationOfOnlineGamingBill2025

0 0 0 0
Preview
Indian Government Flag Security Concerns with WhatsApp Web on Work PCs  The Indian government has issued a significant cybersecurity advisory urging citizens to avoid using WhatsApp Web on office computers and laptops, highlighting serious privacy and security risks that could expose personal information to employers and cybercriminals.  The Ministry of Electronics and Information Technology (MeitY) released this public advisory through its Information Security Awareness (ISEA) team, warning that while accessing WhatsApp Web on office devices may seem convenient, it creates substantial cybersecurity vulnerabilities. The government describes the practice as a "major cybersecurity mistake" that could lead to unauthorized access to personal conversations, files, and login credentials.  According to the advisory, IT administrators and company systems can gain access to private WhatsApp conversations through multiple pathways, including screen-monitoring software, malware infections, and browser hijacking tools. The government warns that many organizations now view WhatsApp Web as a potential security risk that could serve as a gateway for malware and phishing attacks, potentially compromising entire corporate networks.  Specific privacy risks identified  The advisory outlines several "horrors" of using WhatsApp on work-issued devices. Data breaches represent a primary concern, as compromised office laptops could expose confidential WhatsApp conversations containing sensitive personal information. Additionally, using WhatsApp Web on unsecured office Wi-Fi networks creates opportunities for malicious actors to intercept private data. Perhaps most concerning, the government notes that even using office Wi-Fi to access WhatsApp on personal phones could grant companies some level of access to employees' private devices, further expanding the potential privacy violations. The advisory emphasizes that workplace surveillance capabilities mean employers may monitor browser activity, creating situations where sensitive personal information could be accessed, intercepted, or stored without employees' knowledge.  Network security implications  Organizations increasingly implement comprehensive monitoring systems on corporate devices, making WhatsApp Web usage particularly risky. The government highlights that corporate networks face elevated vulnerability to phishing attacks and malware distribution through messaging applications like WhatsApp Web. When employees click malicious links or download suspicious attachments through WhatsApp Web on office systems, they could inadvertently provide hackers with backdoor access to organizational IT infrastructure.  Recommended safety measures For employees who must use WhatsApp Web on office devices, the government provides specific precautionary guidelines. Users should immediately log out of WhatsApp Web when stepping away from their desks or finishing work sessions. The advisory strongly recommends exercising caution when clicking links or opening attachments from unknown contacts, as these could contain malware designed to exploit corporate networks.  Additionally, employees should familiarize themselves with their company's IT policies regarding personal application usage and data privacy on work devices. The government emphasizes that understanding organizational policies helps employees make informed decisions about personal technology use in professional environments.  This advisory represents part of broader cybersecurity awareness efforts as workplace digital threats continue evolving, with the government positioning employee education as crucial for maintaining both personal privacy and corporate network security.

Indian Government Flag Security Concerns with WhatsApp Web on Work PCs #DataPrivacy #IndianGovernment #MobileSecurity

0 0 0 0
Preview
Pabitra Margherita flags off 1st batch of Kailash Manasarovar Yatra 2025 role of various Ministries and Departments

#Indiangovernment organises the Kailash Manasarovar Yatra every year between June and September,

www.newsinc24.com/photo-galler...

0 0 0 0
Preview
Beware iPhone Users: Indian Government Issues Urgent Advisory Over Data Theft Risk  The Indian government has issued an urgent security warning to iPhone and iPad users, citing major flaws in Apple's iOS and iPadOS software. If not addressed, these vulnerabilities could allow cybercriminals to access sensitive user data or make devices inoperable. The advisory was issued by the Indian Computer Emergency Response Team (CERT-In), which is part of the Ministry of Electronics and Information Technology, and urged users to act immediately. Apple devices running older versions of iOS (before to 18.3) and iPadOS (prior to 17.7.3 or 18.3) are particularly vulnerable to the security flaws. The iPad Pro (2nd generation and up), iPad 6th generation and later, iPad Air (3rd generation and up), and iPad mini (5th generation and later) are among the popular models that fall within this category, as are the iPhone XS and newer.  A key aspect of Apple's message system, the Darwin notification system, is one of the major flaws. The vulnerability enables unauthorised apps to send system-level notifications without requiring additional permissions. The device could freeze or crash if it is exploited, necessitating user intervention to restore functionality. These flaws present serious threats. Hackers could gain access to sensitive information such as personal details, financial information, and so on. In other cases, they could circumvent the device's built-in security protections, running malicious code that jeopardises the system's integrity. In the worst-case situation, a hacker could crash the device, rendering it completely unusable. CERT-In has also confirmed that some of these flaws are actively abused by hackers, emphasising the need for users to act quickly.  Apple has responded by releasing security upgrades to fix these vulnerabilities. It is highly recommended that impacted users update to the most latest version of iOS or iPadOS on their devices as soon as feasible. To defend against any threats, this update is critical. Additionally, users are cautioned against downloading suspicious or unverified apps as they could act as entry points for malware. It's also critical to monitor any unusual device behaviour as it may be related to a security risk.  As Apple's footprint in India grows, it is more critical than ever that people remain informed and cautious. Regular software upgrades and sensible, cautious usage patterns are critical for guarding against the growing threat of cyber assaults. iPhone and iPad users can improve the security of their devices and sensitive data by taking proactive measures.

Beware iPhone Users: Indian Government Issues Urgent Advisory Over Data Theft Risk #DataPrivacy #IndianGovernment #iPhoneUsers

0 0 0 0
Preview
Airport Handler Turkey’s Celebi Sues India Over Ban - IndiaWest Journal News Airport Handler Turkey’s Celebi Sues India Over Ban.

Airport Handler Turkey’s Celebi Sues India Over Ban

Full Story: indiawest.com/airport-hand...

#CelebiIndia #TurkeyIndiaDispute #AirportSecurity #NationalSecurity #DelhiHighCourt #CelebiLawsuit #IndianGovernment #GeopoliticalTensions #AviationIndustry

0 0 0 0
Post image

سابق بھارتی آرمی چیف کی کڑی تنقید
مزید پڑھیے www.aaj.tv/news/30460506/
#AajNews #NarendraModi #indiangovernment

0 0 0 0
Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve!  || Speeches N Stories
Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve! || Speeches N Stories YouTube video by Speeches N Stories

Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve! || Speeches N Stories

#pahalgamattack #indiavsterrorism #nationalsecurity #counterterrorism #indiangovernment

www.youtube.com/watch?v=aUpz...

0 0 0 0
Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve!  || Speeches N Stories
Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve! || Speeches N Stories YouTube video by Speeches N Stories

Terrorism Unmasked The Pahalgam Attack and India’s Unbreakable Resolve! || Speeches N Stories

#pahalgamattack #indiavsterrorism #nationalsecurity #counterterrorism #indiangovernment

www.youtube.com/watch?v=aUpz...

0 0 0 0
Preview
HongKong: Auction of Piprahwa Buddhist relics postponed excavated by William Claxton Peppe

#Indiangovernment had stepped in to halt the #auction by Sotheby's Hong Kong,

www.newsinc24.com/news/-hongko...

0 0 0 0
Preview
Modi government arrests Indian Army's cobbler for security breach - The Asian Mirror The Modi government arrests Indian Army's cobbler for security breach. In a major development, the Indian government has detained

The Indian government has detained Sunil Kumar, a cobbler who had reportedly been working for the past 7 to 8 years inside Bathinda cantonment, on charges of endangering national security on Wednesday.

Read story:
theasianmirror.com/top-stories/...

#cobbler #IndianGovernment #SunilKumar

0 0 0 0
Preview
అమిత్ షా చేతిలో రెడ్ ఫైల్ ఏంటి? భారత ప్రభుత్వం పహల్గాం ఉగ్రదాడి నేపథ్యంలో ఏం చర్యలకు దిగుతుందన్న ఆసక్తి ప్రపంచ వ్యాప్తంగా నెలకొంది

అమిత్ షా చేతిలో రెడ్ ఫైల్ ఏంటి?

www.telugupost.com/national/the...

#Pahalgamterrorattack #Indiangovernment #telugupost

0 0 0 0
Preview
Samsung joins in, sues the Indian government over its e-waste pricing policy Court filings show Samsung has sued the Indian government over its e-waste pricing policy.

Samsung joins in, sues the Indian government over its e-waste pricing policy #Technology #Business #Other #Samsung #EWaste #IndianGovernment

0 0 0 0