“We face a continuous threat. "Kami menghadapi ancaman berkelanjutan. It is a global challenge. Ini adalah tantangan global. We are examining the authenticity of the (Chinese hackers') report. Kami memeriksa keaslian laporan (hacker Cina '). It makes certain claims. Itu membuat klaim tertentu. We need to authenticate this. Kita perlu untuk otentikasi ini. Till the enquiry is complete, I can't give a proper answer,” Pilot added. Sampai penyelidikan selesai, saya tidak bisa memberikan jawaban yang tepat, "tambah Pilot.
In this context, Pilot pointed out that he had travelled to the US and Canada and interacted with officials of the research organisations that had put together the report, titled 'Shadows In the Cloud', that was released earlier this month. Dalam konteks ini, Pilot mengatakan bahwa ia telah melakukan perjalanan ke AS dan Kanada dan berinteraksi dengan para pejabat dari organisasi-organisasi penelitian yang telah mengumpulkan laporan, berjudul 'Shadows Di Awan', yang dirilis awal bulan ini.
“The rules of engagement are changing rapidly (in the cyber world). "Aturan keterlibatan berubah dengan cepat (di dunia cyber). The government is alive to the challenge. Pemerintah masih hidup untuk menantang. We have some of the best international practices in place and 24×7 response teams in place (to deal with any threats),” Pilot said. Kami memiliki beberapa dari praktek-praktek internasional terbaik di tempat dan tim respon 24 × 7 di tempat (untuk menangani setiap ancaman), "kata Pilot.
'Shadows In the Cloud' said that Chinese hackers had stolen “secret”, “restricted” and “confidential” information from India's defence ministry, its diplomatic missions abroad, the National Security Council Secretariat and various other bodies. 'Shadows Di Awan' mengatakan bahwa hacker Cina telah mencuri "rahasia", "terbatas" dan "rahasia" informasi dari kementerian pertahanan India, misi diplomatik di luar negeri, Dewan Keamanan Nasional Sekretariat dan badan-badan lainnya.
“During our investigation we recovered documents that contain sensitive information that could be exploited by an adversary for intelligence purposes,” the report said. "Selama penyelidikan kami pulih dokumen yang berisi informasi sensitif yang dapat dimanfaatkan oleh musuh untuk tujuan intelijen," kata laporan itu.
It has been prepared by Information Warfare Monitor and Shadowserver Foundation, a group of Canadian and American cyber security researchers, after an eight-month study of Chinese hacking operations. Telah disiapkan oleh Informasi Warfare Monitor dan Shadowserver Foundation, sebuah kelompok peneliti cyber Kanada dan Amerika keamanan, setelah studi delapan bulan operasi hacking Cina.
“We recovered a document that appears to be encrypted diplomatic correspondence, two documents classified as Secret, six as Restricted and five as Confidential,” the report said. "Kami menemukan sebuah dokumen yang tampaknya korespondensi diplomatik dienkripsi, dua dokumen diklasifikasikan sebagai Rahasia, enam sebagai dibatasi dan lima sebagai rahasia," kata laporan itu.
“These documents contain sensitive information taken from a member of the National Security Council Secretariat concerning secret assessments of India's security situation in the states of Assam, Manipur, Nagaland and Tripura as well as concerning the Naxalites and Maoists. "Dokumen-dokumen berisi informasi sensitif yang diambil dari anggota Dewan Keamanan Nasional Sekretariat tentang rahasia penilaian situasi keamanan India di negara bagian Assam, Manipur, dan Tripura Nagaland serta tentang Naxalities dan Maois.
“In addition, they contain confidential information taken from Indian embassies regarding India's international relations with and assessments of activities in West Africa, Russia/Commonwealth of Independent States and the Middle East, as well as visa applications, passport office circulars and diplomatic correspondence,” the report said. "Selain itu, mereka mengandung informasi rahasia yang diambil dari kedutaan besar India mengenai hubungan internasional India dengan dan penilaian kegiatan di Afrika Barat, Rusia / Commonwealth of Independent States dan Timur Tengah, serta aplikasi visa, surat edaran paspor kantor dan korespondensi diplomatik," kata laporan itu.
“The attackers also exfiltrated detailed personal information regarding a member of the Directorate General of Military Intelligence. "Para penyerang juga exfiltrated informasi pribadi rinci mengenai anggota Direktorat Jenderal Intelijen Militer. We recovered documents and presentation to Pechora Missile system, Iron Dome Missile System and Project Shakti,” the report added. Kami menemukan dokumen dan presentasi ke sistem Rudal Pechora, Iron Dome Missile System dan Proyek Shakti, "tambah laporan itu.
The report came almost a month after India alleged that Chinese hackers attacked its government computer networks. Laporan itu datang hampir sebulan setelah India menuduh bahwa hacker Cina menyerang pemerintahannya jaringan komputer. Officials in the defence ministry and the army have so far refused to comment on the report. Para pejabat di kementerian pertahanan dan tentara sejauh ini menolak untuk mengomentari laporan tersebut.
“Although the identity and motivation of the attackers remain unknown, the report is able to determine the location (Chengdu, PRC) as well as some of the associations of the attackers through circumstantial evidence,” the executive summary of the report said. "Meskipun identitas dan motivasi penyerang tetap tidak diketahui, laporan tersebut dapat menentukan lokasi (Chengdu, RRC) serta beberapa asosiasi penyerang melalui bukti," kata ringkasan eksekutif laporan.
“Given the sophistication of the intruders and the targets of the operation, the researchers said, it is possible that the Chinese government approved of the spying,” The New York Times contended after the report was released. "Mengingat kecanggihan para penyusup dan target operasi, kata para peneliti, adalah mungkin bahwa pemerintah Cina menyetujui dari mata-mata," berpendapat The New York Times setelah laporan dirilis.

Posting Komentar
Terima kasih atas komentar anda !