Chinese hacking group targets IT systems of two Indian vaccine makers

Chinese hacking group targets IT systems of two Indian vaccine makers (2)

In recent weeks, a Chinese state-backed hacking group targeted the IT systems of two Indian vaccine makers whose coronavirus shots are being used in the country’s immunisation campaign, cyber intelligence firm Cyfirma told Reuters.

Rivals China and India have both sold or gifted COVID-19 shots to many countries. India produces more than 60% of all vaccines sold in the world.

Goldman Sachs-backed Cyfirma, based in Singapore and Tokyo, said Chinese hacking group APT10, also known as Stone Panda, had identified gaps and vulnerabilities in the IT infrastructure and supply chain software Bharat Biotech and the Serum Institute of India (SII), the world’s largest vaccine maker.

“The real motivation here is actually exfiltrating intellectual property and getting competitive advantage over Indian pharmaceutical companies,” said Cyfirma Chief Executive Kumar Ritesh, formerly a top cyber official with British foreign intelligence agency MI6.

He said APT10 was actively targeting SII, making the AstraZeneca vaccine for many countries and soon starting bulk-manufacturing Novavax shots.

“In the case of Serum Institute, they have found a number of their public servers running weak web servers, these are vulnerable web servers,” Ritesh said, referring to the hackers. “They have spoken about weak web application, they are also talking about weak content-management system. It’s quite alarming.”

China’s foreign ministry did not reply to a request for comment. But responding to a question on whether Chinese hackers had a role in attacking India’s power grid which caused a blackout in Mumbai last year, the ministry said it was a staunch defender of cybersecurity.

“China firmly opposes and cracks down on all forms of cyber attacks,” its embassy in New Delhi said on Twitter, quoting the foreign ministry. “Speculation and fabrication have no role to play on the issue of cyber attacks.”

SII and Bharat Biotech declined to comment. The office of the director-general of the state-run Indian Computer Emergency Response Team (CERT) said the matter had been handed to its operations director, S.S. Sarma.

Sarma told Reuters CERT was a “legal agency and we can’t confirm this thing to media”.

Cyfirma said in a statement it had informed CERT authorities and that they had acknowledged the threat.

The U.S. Department of Justice said here in 2018 that APT10 had acted in association with the Chinese Ministry of State Security.

Ritesh, whose firm follows some 750 cybercriminals and monitors nearly 2,000 hacking campaigns using a tool called DeCYFIR, said it was not yet clear what information APT10 may have accessed from the Indian companies.

Written by Ritik Gupta

His name is Ritik Gupta; currently pursuing law. He has always kept pride as his everything. He deems writing as not like any other hobby but a reflection of one’s intellectuality. He likes to research on the parasitic problems and then lay them down in such a means that can be of assistance to the society. He just not studies law but treats it a controversial weapon to defeat the wrong.

Leave a Reply

Your email address will not be published. Required fields are marked *

Food inflation in India is likely to accelerate in coming months

Doing MBA in the Time of Pandemic and Economic Recession