Hackers Try Luring Indian Army Officers, Offers Them Foreign Postings


New Delhi: The suspected Chinese and Pakistani hackers tried to hack into the computers of Indian army officer by trying to inject data stealing malware. They tried to lure the army officers with offers of a foreign posting in Sri Lanka.

Also Read: IAF Officer Mysteriously Missing From Army Hospital In Kolkata

“The pinpointed attacks were launched on Friday by the hackers to middle-rung Indian Army officers by sending them an email purportedly sent from a government server and asking them to avail the offer of going for a posting to attend a prestigious course in a Sri Lankan military academy,” Army sources told Mail Today.

Also Read: Pak Army Warns Indian Army Against ‘Misadventures’ Along LoC

According to the sources, the sender of the mail was nicknamed ADGMT-16. The mail appeared to be sent by Indian Army’s Directorate General of Military Training which details officers and personnel for attending courses within and outside the country.
Soon after receiving the mail, the officers referred it to the Army Cyber Group which issued an immediate alert to caution the officers against opening the mail. The Army Cyber Group in its warning, said, “A malicious email from *karmicc16@nic.in* is being sent to Army personnel. The email contains a malicious file ‘DEPUTATION_OF_ONE_ARM Y_OFFICER_TO_ATTEND_SRI_ LANKA. Xls’. On opening the malicious file, a data-stealing malware gets installed in the computer. Please do not open the email,” said.

Also Read: Ex Army Man’s Wife Sends 56 Inch Blouse To NaMo

Both the Army Cyber Group and the Computer Emergency Response Team (CERT-India) are trying to ascertain the source of the attacks. They suspect it to be the job of Chinese and Pakistani hackers as they have been using similar tactics in the past as well.
Sources said the first few officers who received the mail got suspicious as soon as they received it as the Army does not offer or announce postings of officers on the private mailbox and communicates only on its intranet.