China & Pak’s New Plan To Honey-Trap Indian Army Officers


New Delhi: A fresh Intelligence Bureau report states that both China and Pakistan have come together to set up a module exclusively to honey-trap Indian Army personnel. The module works out of two locations, the report states. While one unit is based in Karachi, the other was set up in Bangladesh.

The alert comes in the wake of the Indian Defence Ministry directing its troops to immediately delete 40 Chinese applications from their phones. These applications were being used to source location information of the Indian troops posted both at the Pakistan and Chinese border.

According to reports, While the Pakistanis make the call in Hindi, the Chinese women speak English. The Chinese have developed applications through which they first track and understand the internet habits of the Indian officers.

Those persons using Chinese smartphones are particularly vulnerable, the report states. The trap is often laid on the social media sites. WhatsApp is another medium through which these traps are laid. What is even more worrisome is that both the Chinese and Pakistanis have set up their moles in India as well. Once they manage to trap the person, they set up a meeting at a coffee shop.

In this modus operandi, the use of money has been completely restricted. Both the Chinese and Pakistanis feel that money leaves a trail and hence must be avoided. It is the Chinese who develop the technology while the Pakistanis set up the trap. Two officers of the ISI Sajid Rana and Abid are overseeing this entire module.

The module apart from setting up honey traps also are actively involved in hacking phones and systems of the Indian officials. The Chinese set up a chatting application through which they target phones using the Trojan malware, the report also states.

The most lethal application was the Smeshapp which could be installed both on the desktop as well as the mobile phones. Through this application, the Chinese and Pakistanis have managed to get information on troop movement and deployment.

The data that was installed on the phones of these persons have been compromised on various occasions, the report states. Although the Smeshapp was taken down by Google Play, the module continues to promote it as a chatting interface on the social media.

An ID is created by the module member on Facebook and fake images are used. A team within the module then goes about identifying persons to target. Once the target is identified, images are exchanged and calls are made. The portal promised to give credible data and any officer logging into it would become vulnerable to a Trojan malware attack. Once the malware takes over the system or phone all data on it would be compromised, the report also stated.

The Defence Ministry had recently written to the armed forces to delete 40 Chinese applications. The directive was issued based on the threat perception.The advisory had stated that these applications have their servers in China and they would be able to track troop movement through it.