Security analysts see a common connection linking Chinese actors to attacks on critical infrastructure all across India. Credit: Shane Rounce IT systems at Indian electricity organizations in Maharashtra, Assam, Delhi, and Tamil Nadu have been targeted by a hacking group believed to be based in China, according to security intelligence provider Recorded FutureIt wasn’t just power distribution infrastructure: intrusion attempts were also detected at the Mumbai and VO Chidambaranar (formerly Tuticorin) ports.Charity Wright, a threat intelligence analyst at Recorded Future, revealed in a web conference how the firm tracked the now-famous China-linked hacker group RedEcho and the extent of its reach into India’s critical infrastructure. Through network traffic analysis and by analysing potential exfiltration events, the threat-intel firm detected patterns pointing to an attempted cyber-attack on the country’s critical infrastructure by RedEcho – the firm detected high-volume, sustained network traffic from Indian power stations to servers used by the Chinese state-sponsored hacker group.While some have attempted to link the attacks to a power outage that affected Mumbai on 12 October, deemed an act of “sabotage” by Maharashtra energy minister Nitin Raut, Recorded Future said it has not been able to substantiate any such link. Wright said that RedEcho has overlapping modus operandi with other known Chinese groups like APT41 and Tonto Team. CSO has previously reported on APT41’s activities: a veteran of sorts among hacker groups, it gained notoriety for perpetrating a cyber-attack on CCleaner back in 2017. It has since been targeting critical infrastructure assets across the globe by targeting establishments in the manufacturing, power, pharma, and telecom sectors.The evidence pointing to a state-sponsored attack“The targeting is very specific to critical infrastructure. This is both unusual and unsettling. The traffic landing in the RedEcho infrastructure came exclusively from the 10 power grid assets as well as from two ports,” Wright said. The discernible pattern—deduced through the server fingerprinting of adversary infrastructure—suggested the campaign was highly targeted due to the high concentration of IPs resolving to the critical assets. The power stations and ports in question were communicating with a collection of servers used for hacking that Recorded Future has codenamed “axiomaticasymptote,” and that it links with Chinese threat actors.It has identified the axiomaticasymptote servers based on distinct characteristics such as HTTP header responses.In the past, these servers were used by Chinese threat actors for command and control of closed-source malware families. Take ShadowPad, for instance: it has been used by Chinese hacker groups like APT41, Tonto Team, Tick, and the perpetrators of the Icefog APT malware.Cyber-attacks on critical infrastructure, unlike ransomware, almost never have an economic motive. Also, the targets chosen for the attack were spread across the length and breadth of the country.“We also observed hosting overlaps between RedEcho DDNS domains and previously-reported APT41 and Tonto Team infrastructure,” said Wright.In addition to this, Recorded Future also observed the usage of CNDNS – a China-based domain reseller and hosting provider. The accumulation of clues is not enough for Recorded Future to link the intrusions with the existing hacking groups it has identified: for now RedEcho remains a distinct activity group linked to China. Related content feature How a digital design firm navigated its SOC 2 audit L+R's pursuit of SOC 2 certification was complicated by hardware inadequacies and its early adoption of AI, but a successful audit has provided security and business benefits. By Alex Levin Nov 28, 2023 11 mins Certifications Certifications IT Training news GE investigates alleged data breach into confidential projects: Report General Electric has confirmed that it has started an investigation into the data breach claims made by IntelBroker. By Shweta Sharma Nov 27, 2023 3 mins Data Breach opinion A year after ChatGPT’s debut, is GenAI a boon or the bane of the CISO’s existence? You can try to keep the flood of generative AI at bay but embracing it with proper vigilance is likely the best hope to maintain control and prevent the scourge of it becoming shadow AI. By Christopher Burgess Nov 27, 2023 6 mins Generative AI Generative AI Generative AI feature Rise of the cyber CPA: What it means for CISOs New accountant certification rules starting January 2024 could deliver many new cybersecurity-trained accountants. Is this good or bad news for CISOs? By Evan Schuman Nov 27, 2023 7 mins CSO and CISO Compliance Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe