Gallery
- PM Modi visit USAOnly the mirror in my washroom and phone gallery see the crazy me : Sara KhanKarnataka rain fury: Photos of flooded streets, uprooted treesCannes 2022: Deepika Padukone stuns at the French Riviera in Sabyasachi outfitRanbir Kapoor And Alia Bhatt's Wedding Pics - Sealed With A KissOscars 2022: Every Academy Award WinnerShane Warne (1969-2022): Australian cricket legend's life in picturesPhotos: What Russia's invasion of Ukraine looks like on the groundLata Mangeshkar (1929-2022): A pictorial tribute to the 'Nightingale of India'PM Modi unveils 216-feet tall Statue of Equality in Hyderabad (PHOTOS)
Freya Deshmane riding on Reinroe Adare Acrobat claimed the top spot and clinched the gold
- Salah sets Premier League record in Liverpool's draw at Newcastle
- India Open Competition in Shotgun begins in Jaipur, paving way for Nationals' qualification
- Hockey India names Amir Ali-led 20-man team for Junior Asia Cup
- Harmanpreet Singh named FIH Player of the Year, PR Sreejesh gets best goalkeeper award
- World Boxing medallist Gaurav Bidhuri to flag off 'Delhi Against Drugs' movement on Nov 17
US company's tech abused by Indian government to spy on Pakistan, China: Report Last Updated : 18 Sep 2021 06:07:26 PM IST A US companys tech was abused by the Indian government amid warnings that Americans are contributing to a spyware industry already under fire for being out of control, Forbes reported.
Earlier this year, researchers at the Russian cybersecurity firm Kaspersky had witnessed a cyberespionage campaign targeting Microsoft Windows PCs at government and telecom entities in China and Pakistan. They began in June 2020 and continued through till April 2021. What piqued the researchers' interest was the hacking software used by the digital spies, whom Kaspersky had dubbed as 'Bitter APT', a pseudonym for an unspecified government agency. Aspects of the code looked like some of the Moscow antivirus providers had previously seen and attributed to a company it gave the cryptonym 'Moses', the report said.Sometimes, American companies aren't the victims, but the ones fuelling costly digital espionage. Moses' real identity, Forbes has learnt, is a company based in Austin, Texas, called Exodus Intelligence, according to two sources with knowledge of the Kaspersky research. And Bitter APT, the Moses customer, is India, added one source.Little known outside the cybersecurity and intelligence worlds, over the last ten years, Exodus has made a name for itself with a Time magazine cover story.Exodus, when asked by Five Eyes countries (an alliance of intelligence-sharing countries that includes the US, the UK, Canada, Australia and New Zealand) or their allies, will provide both information on a zero-day vulnerability and the software required to exploit it.But its main product is akin to a Facebook news feed of software vulnerabilities, sans exploits, for up to $250,000 a year. It's marketed primarily as a tool for defenders, but customers can do what they want with the information on those Exodus zero days, ones that typically cover the most popular operating systems, from Windows to Google's Android and Apple's iOS.That feed is what India bought and likely weaponised, said Exodus CEO and co-founder Logan Brown. He told Forbes that after an investigation, he believes that India handpicked one of the Windows vulnerabilities from the feed-allowing deep access to Microsoft's operating system, and Indian government personnel or a contractor adapted it for malicious means.India was subsequently cut off from buying new zero-day research from his company in April, said Brown, and it has worked with Microsoft to patch the vulnerabilities. The Indian use of his company's research was beyond the pale, though Exodus doesn't limit what customers do with its findings, Brown said, adding, "You can use it offensively if you want, but not if you're going to be shotgun blasting Pakistan and China. I don't want any part of that, (The Indian embassy in London hadn't responded to requests for comment)," Forbes reported.The company also looked at a second vulnerability Kaspersky had attributed to Moses, another flaw that allowed a hacker to get higher privileges on a Windows computer. It was not linked to any particular espionage campaign, but Brown confirmed that it was one of his company's, adding that it would "make sense" that India or one of its contractors had weaponised that vulnerability too, the report said.Brown is also exploring whether its code has been leaked or abused by others. Beyond the two zero days already abused, according to Kaspersky, "at least six vulnerabilities" made by Moses have made it out "into the wild" in the last two years.Also according to Kaspersky, another hacking crew known as DarkHotel - believed by some cybersecurity researchers to be sponsored by South Korea - has used Moses' zero days.South Korea is not a customer of Exodus. "We are pretty sure India leaked some of our research. We cut them off and haven't heard anything since then, so the assumption is that we were correct," Brown said.Knowing that its zero days can be used offensively, Brown's company could have chosen not to sell to India, a country that's been accused of abuse of spyware in recent revelations about global use of tools made by Israel's $1 billion-valued NSO Group, the report said.IANS New Delhi For Latest Updates Please-
Join us on
Follow us on
172.31.16.186