SlideShare a Scribd company logo
1 of 14
Chinese Cyber
Exploitation in
India’s Power
Grid
Is There a linkage to Mumbai
Power Outage?
22743 Rohan Mistry
On Feb. 28, 2021 The New York Times (NYT), based on analysis by a U.S. based private intelligence
firm Recorded Future, reported that a Chinese entity penetrated India’s power grid at multiple load
dispatch points. Chinese malware intruded into the control systems that manage electric supply
across India, along with a high-voltage transmission substation and a coal-fired power plant.
Alleged activity against critical Indian infrastructure installations was as much meant to act as a
deterrent against any Indian military thrust along the Line of Actual Control as it was to support
future operations to cripple India’s power generation and distribution systems in event of war.
Most of the malware was never activated.
The cyber security company had sent its findings to the Indian Computer Emergency Response
Team (CERT-In) within the Ministry of Electronics and Information Technology of the Government of
India.
Recorded Future’s chief operating officer, said that the Chinese state-sponsored group, which the
firm named Red Echo, “has been seen to systematically utilize advanced cyber intrusion techniques
to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation and
transmission infrastructure.”
Introduction
ShadowPad
According to cyber security
firm FireEye, the targeting
makes use of a modular
backdoor called ShadowPad
that was originally connected
to state-sponsored groups
like APT41 or Barium. Over the
last couple of years, at least
five Chinese threat activity
groups have used ShadowPad.
What exactly is ShadowPad ?
ShadowPad extracts information about
the host, executes commands,
interacts with the file system and
registry, and deploys new modules to
extend functionality. CTU researchers
discovered that ShadowPad payloads
are deployed to a host either
encrypted within a DLL loader or
within a separate file alongside a DLL
loader. These DLL loaders decrypt and
execute ShadowPad in memory after
being sideloaded by a legitimate
executable vulnerable to DLL search
order hijacking.
Other
Attacks on
Confidential
data
GhostNet
China has been conducting cyber
operations against India for a long time. One
of the earlier examples was the GhostNet
episode. Between June 2008 and March
2009, the Information Warfare Monitor
conducted an investigation focused on
allegations of Chinese cyber espionage
against the Tibetan community.
GhostNet penetrated computer systems
containing sensitive and secret information
at the private offices of the Dalai Lama and
other Tibetan targets.
FriarFox
Proofpoint said the attackers targeted Tibetan organizations with spear-phishing emails that lured
members on websites where they'd be prompted to install a Flash update to view the site's content.
These websites contained code that separated users. Only Firefox users with an active Gmail session
were prompted to install the malicious add-on. In this particular campaign, which Proofpoint
codenamed FriarFox, attacks began in January 2021 and continued throughout February
Chinese state-sponsored hackers have been
consistently targeting Tibetan organizations
across the world. In a recent incidence, Chinese
hackers used a malicious Firefox add-on that was
configured to steal Gmail and Firefox browser
data and then download malware on infected
systems. Cybersecurity firm Proofpoint in
February 2021 discovered the attacks. It has been
linked to a group the company tracks under the
codename of TA413.
Sources said that the ministry received an email from the Indian Computer Emergency Response Team (CERT-
In) on November 19, 2020 on the threat of malware called Shadow Pad at some control centers of POSOCO.
Accordingly, the action was taken to address these threats.
The power ministry said that the National Critical Information Infrastructure Protection Centre (NCIIPC), which
oversees cyber security operations, had sounded an alert on February 12 about a Chinese state-sponsored
threat actor group known as Red Echo targeting regional load dispatch centers (RLDCs) and state load
dispatch centers (SLDCs).
The statement said, “NCIIPC informed through a mail dated 12th February 2021 about the threat by Red Echo
through a malware called Shadow Pad.”
After the ministry came to know about the threats, all IPs and domains listed in the NCIIPC
mail were blocked in the firewall at all control centers.
The sources in the ministry said, "Log of firewall is being monitored for any connection attempt towards the
listed IPs and domains. Additionally, all systems in control centers were scanned and cleaned by antivirus.”
Official Indian Response to the Incident
Steep rise in the attacks against many
companies in India’s power sector.
“10 distinct Indian power sector
organizations, including 4 or the 5
Regional Load Dispatch Centers
(RLDC)... have been identified as
targets in a concerted campaign
against India's critical
infrastructure,” said the report.
Chidambaranar and Mumbai ports
were also identified as targets.
Examples of Cyber
Attacks on
Power Plants
around the
World
Attack on Russia
As countries and businesses rely
on electricity, power grids can be
a prime target for signaling an
adversary's intent. Russia used
this tactic against Ukraine
several times by triggering
blackouts across the country.
The Russian attacks took place
amid an ongoing conflict
between Russia and Ukraine
centred primarily around control
of Crimea.
PROBLEM VS. SOLUTION
when do we realize that breach
has happened, does it have the
capacity to damage the system,
what is the resilience of the
system, how much time it takes
to plug the gap etc.
Solution
No cyber defense can be full-
proof. Attacks will come,
defenses would be breached. If
the Chinese hackers can breach
the Pentagon, it can happen in
India also.
Problem
Conclusion
No cyber defense can be full-proof.
Attacks will come, defenses would be
breached. If the Chinese hackers can
breach the Pentagon, it can happen in India
also. Points to be considered are: when do
we realize that breach has happened, does
it have the capacity to damage the system,
what is the resilience of the system, how
much time it takes to plug the gap etc.
THANKS!
Do you have any questions?
rohanmistry333@gmail.com
yourcompany.com

More Related Content

Similar to Chinese Cyber attack on mumbai power plant

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
Amit Kumar
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
Fas (Feisal) Mosleh
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
alinainglis
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
Microsoft Asia
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
annrodgerson
 
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docxREADING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
sodhi3
 

Similar to Chinese Cyber attack on mumbai power plant (20)

Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
seqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdfseqrite-prediction-report-2023.pdf
seqrite-prediction-report-2023.pdf
 
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
The Biggest Cyber and Physical Security Threats to Critical Infrastructure FM...
 
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
54 Chapter 1 • The Threat EnvironmentFIGURE 1-18 Cyberwar .docx
 
HR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company DataHR's Critical Role in Protecting Company Data
HR's Critical Role in Protecting Company Data
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Cyber war
Cyber warCyber war
Cyber war
 
China Cyber
China CyberChina Cyber
China Cyber
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Cyber-what?
Cyber-what?Cyber-what?
Cyber-what?
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Chapter-2.docx
Chapter-2.docxChapter-2.docx
Chapter-2.docx
 
Protecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email ThreatsProtecting the Oil and Gas Industry from Email Threats
Protecting the Oil and Gas Industry from Email Threats
 
A Review Paper on Cyber-Security
A Review Paper on Cyber-SecurityA Review Paper on Cyber-Security
A Review Paper on Cyber-Security
 
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKSAN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
AN EMPIRICAL STUDY ON CYBER SECURITY THREATS AND ATTACKS
 
Understanding the mirai botnet
Understanding the mirai botnetUnderstanding the mirai botnet
Understanding the mirai botnet
 
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docxREADING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
READING HEAD GROUP 2 BLACK ENERGYGroup 2 Black Energy.docx
 

More from RohanMistry15

Artificial Intelligence - A modern approach 3ed
Artificial Intelligence - A modern approach 3edArtificial Intelligence - A modern approach 3ed
Artificial Intelligence - A modern approach 3ed
RohanMistry15
 

More from RohanMistry15 (20)

software-quality-assurance question paper 2023
software-quality-assurance question paper 2023software-quality-assurance question paper 2023
software-quality-assurance question paper 2023
 
security-in-computing question paper 2023
security-in-computing question paper 2023security-in-computing question paper 2023
security-in-computing question paper 2023
 
IT-service-management question paper 2023
IT-service-management question paper 2023IT-service-management question paper 2023
IT-service-management question paper 2023
 
geographical-information-system question paper
geographical-information-system question papergeographical-information-system question paper
geographical-information-system question paper
 
Business-Intelligence question paper 2023
Business-Intelligence question paper 2023Business-Intelligence question paper 2023
Business-Intelligence question paper 2023
 
Aeronautical Engineering Career Information
Aeronautical Engineering Career InformationAeronautical Engineering Career Information
Aeronautical Engineering Career Information
 
Zeus learning
Zeus learningZeus learning
Zeus learning
 
Artificial Intelligence - A modern approach 3ed
Artificial Intelligence - A modern approach 3edArtificial Intelligence - A modern approach 3ed
Artificial Intelligence - A modern approach 3ed
 
Advanced Web Programming Chapter 8
Advanced Web Programming Chapter 8Advanced Web Programming Chapter 8
Advanced Web Programming Chapter 8
 
Advanced Web Programming Chapter 5
Advanced Web Programming Chapter 5Advanced Web Programming Chapter 5
Advanced Web Programming Chapter 5
 
Advanced Web Programming Chapter 4
Advanced Web Programming Chapter 4Advanced Web Programming Chapter 4
Advanced Web Programming Chapter 4
 
Advanced Web Programming Chapter 13 & 14
Advanced Web Programming Chapter 13 & 14Advanced Web Programming Chapter 13 & 14
Advanced Web Programming Chapter 13 & 14
 
Advanced Web Programming Chapter 12
Advanced Web Programming Chapter 12Advanced Web Programming Chapter 12
Advanced Web Programming Chapter 12
 
Advanced Web Programming Chapter 2
Advanced Web Programming Chapter 2Advanced Web Programming Chapter 2
Advanced Web Programming Chapter 2
 
Advanced Web Programming Chapter 3
Advanced Web Programming Chapter 3Advanced Web Programming Chapter 3
Advanced Web Programming Chapter 3
 
Advanced Web Programming Chapter 10
Advanced Web Programming  Chapter 10Advanced Web Programming  Chapter 10
Advanced Web Programming Chapter 10
 
Advanced Web Programming Chapter 11
Advanced Web Programming Chapter 11Advanced Web Programming Chapter 11
Advanced Web Programming Chapter 11
 
Advanced Web Programming Chapter 9
Advanced Web Programming Chapter 9Advanced Web Programming Chapter 9
Advanced Web Programming Chapter 9
 
Advanced Web Programming Chapter 6
Advanced Web Programming Chapter 6Advanced Web Programming Chapter 6
Advanced Web Programming Chapter 6
 
Advanced Web Programming Chapter 1
Advanced Web Programming Chapter 1Advanced Web Programming Chapter 1
Advanced Web Programming Chapter 1
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Chinese Cyber attack on mumbai power plant

  • 1. Chinese Cyber Exploitation in India’s Power Grid Is There a linkage to Mumbai Power Outage? 22743 Rohan Mistry
  • 2. On Feb. 28, 2021 The New York Times (NYT), based on analysis by a U.S. based private intelligence firm Recorded Future, reported that a Chinese entity penetrated India’s power grid at multiple load dispatch points. Chinese malware intruded into the control systems that manage electric supply across India, along with a high-voltage transmission substation and a coal-fired power plant. Alleged activity against critical Indian infrastructure installations was as much meant to act as a deterrent against any Indian military thrust along the Line of Actual Control as it was to support future operations to cripple India’s power generation and distribution systems in event of war. Most of the malware was never activated. The cyber security company had sent its findings to the Indian Computer Emergency Response Team (CERT-In) within the Ministry of Electronics and Information Technology of the Government of India. Recorded Future’s chief operating officer, said that the Chinese state-sponsored group, which the firm named Red Echo, “has been seen to systematically utilize advanced cyber intrusion techniques to quietly gain a foothold in nearly a dozen critical nodes across the Indian power generation and transmission infrastructure.” Introduction
  • 3. ShadowPad According to cyber security firm FireEye, the targeting makes use of a modular backdoor called ShadowPad that was originally connected to state-sponsored groups like APT41 or Barium. Over the last couple of years, at least five Chinese threat activity groups have used ShadowPad.
  • 4. What exactly is ShadowPad ? ShadowPad extracts information about the host, executes commands, interacts with the file system and registry, and deploys new modules to extend functionality. CTU researchers discovered that ShadowPad payloads are deployed to a host either encrypted within a DLL loader or within a separate file alongside a DLL loader. These DLL loaders decrypt and execute ShadowPad in memory after being sideloaded by a legitimate executable vulnerable to DLL search order hijacking.
  • 6. GhostNet China has been conducting cyber operations against India for a long time. One of the earlier examples was the GhostNet episode. Between June 2008 and March 2009, the Information Warfare Monitor conducted an investigation focused on allegations of Chinese cyber espionage against the Tibetan community. GhostNet penetrated computer systems containing sensitive and secret information at the private offices of the Dalai Lama and other Tibetan targets.
  • 7. FriarFox Proofpoint said the attackers targeted Tibetan organizations with spear-phishing emails that lured members on websites where they'd be prompted to install a Flash update to view the site's content. These websites contained code that separated users. Only Firefox users with an active Gmail session were prompted to install the malicious add-on. In this particular campaign, which Proofpoint codenamed FriarFox, attacks began in January 2021 and continued throughout February Chinese state-sponsored hackers have been consistently targeting Tibetan organizations across the world. In a recent incidence, Chinese hackers used a malicious Firefox add-on that was configured to steal Gmail and Firefox browser data and then download malware on infected systems. Cybersecurity firm Proofpoint in February 2021 discovered the attacks. It has been linked to a group the company tracks under the codename of TA413.
  • 8. Sources said that the ministry received an email from the Indian Computer Emergency Response Team (CERT- In) on November 19, 2020 on the threat of malware called Shadow Pad at some control centers of POSOCO. Accordingly, the action was taken to address these threats. The power ministry said that the National Critical Information Infrastructure Protection Centre (NCIIPC), which oversees cyber security operations, had sounded an alert on February 12 about a Chinese state-sponsored threat actor group known as Red Echo targeting regional load dispatch centers (RLDCs) and state load dispatch centers (SLDCs). The statement said, “NCIIPC informed through a mail dated 12th February 2021 about the threat by Red Echo through a malware called Shadow Pad.” After the ministry came to know about the threats, all IPs and domains listed in the NCIIPC mail were blocked in the firewall at all control centers. The sources in the ministry said, "Log of firewall is being monitored for any connection attempt towards the listed IPs and domains. Additionally, all systems in control centers were scanned and cleaned by antivirus.” Official Indian Response to the Incident
  • 9. Steep rise in the attacks against many companies in India’s power sector. “10 distinct Indian power sector organizations, including 4 or the 5 Regional Load Dispatch Centers (RLDC)... have been identified as targets in a concerted campaign against India's critical infrastructure,” said the report. Chidambaranar and Mumbai ports were also identified as targets.
  • 10. Examples of Cyber Attacks on Power Plants around the World
  • 11. Attack on Russia As countries and businesses rely on electricity, power grids can be a prime target for signaling an adversary's intent. Russia used this tactic against Ukraine several times by triggering blackouts across the country. The Russian attacks took place amid an ongoing conflict between Russia and Ukraine centred primarily around control of Crimea.
  • 12. PROBLEM VS. SOLUTION when do we realize that breach has happened, does it have the capacity to damage the system, what is the resilience of the system, how much time it takes to plug the gap etc. Solution No cyber defense can be full- proof. Attacks will come, defenses would be breached. If the Chinese hackers can breach the Pentagon, it can happen in India also. Problem
  • 13. Conclusion No cyber defense can be full-proof. Attacks will come, defenses would be breached. If the Chinese hackers can breach the Pentagon, it can happen in India also. Points to be considered are: when do we realize that breach has happened, does it have the capacity to damage the system, what is the resilience of the system, how much time it takes to plug the gap etc.
  • 14. THANKS! Do you have any questions? rohanmistry333@gmail.com yourcompany.com