With the cyberattack threat from China and other adversaries mounting by the day, the national security agencies, including the tri-services, are currently participating in a weeklong cyber defence exercise to test the resilience of India’s critical civilian and military infrastructure, officials familiar with the matter said on Saturday.
While the government is tight-lipped on this count, the cybersecurity exercises are being held under the aegis of the Defence Cyber Agency (DCyA) with other branches of national security participating in the effort to test the firewalls guarding India’s critical infrastructure.
The cyber defence exercise comes after US cyber experts found Chinese sleeper malware in Australia and Japanese networks as part of Quad cybersecurity cooperation.
“This malware is normally injected into the critical network and made to lie dormant for years. The bug is then activated by China any time it chooses to cripple the critical infrastructure or extract information,” said one of the officials cited above.
It is understood that the November 23, 2022, cyberattack on five servers of AIIMS in Delhi was engineered by China-based hackers and the cyber post-mortem of the attack showed that the malware or the bug to steal medical records was planted in the servers way back in 2014. On the military front, the 25-infantry division of Indian Army, based in Poonch, was cyber-attacked by the adversary during the Pakistani retaliation to the 2019 Operation Bander launched by the Indian Air Force (IAF) to destroy a Jaish-e-Mohammed terrorist training camp at Balakot in Khyber-Pakhtunkhwa on February 26. The Balakot operation was conducted by the IAF to avenge the killings of 40 CRPF troopers at the hands of a Jaish suicide bomber in Pulwama on February 14, 2019. The Pakistani retaliation to Balakot was launching of missiles at the Indian Army’s brigade at Poonch on February 27, 2019.