December 15, 2025 09:17 pm (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Centre moves to replace MGNREGA with 'G Ram G', sets stage for winter session showdown | Messi surrounded by VIPs, fans rage: Five held in stadium vandalism case | 'Messi was uncomfortable, lost his cool!': Ex-India footballer reveals what really happened at chaotic Kolkata stadium | PM Modi embarks on historic three-nation visit to Jordan, Ethiopia, and Oman | Caught in Thailand! Fugitive Goa nightclub owners detained after deadly fire kills 25 | After Putin’s blockbuster Delhi visit, Modi set to host German Chancellor Friedrich Merz in January | Delhi High Court slams govt, orders swift compensation as IndiGo crisis triggers fare shock and nationwide chaos | Amazon drops a massive $35 billion India bet! AI push, 1 million jobs and big plans revealed at Smbhav Summit | IndiGo’s ‘All OK’ claim falls apart! Govt slaps 10% flight cut after weeklong chaos | Centre finally aligns IndiGo flights with airline's operating ability, cuts its winter schedule by 5%
Phishing
Image: Pixabay

Top Cybersecurity consultant firm claims Pakistani group launches widespread phishing attack on Indians

| @indiablooms | Jul 12, 2021, at 04:59 am

Seqrite, a cybersecurity consultant and the enterprise arm of Quick Heal Technologies, has claimed that a suspected Pakistani group launched  a wave of sophisticated phishing attacks targeting India’s critical infrastructure such as power and telecom, media reports said.

According to the IT security consultant, the initial intrusion chain begins with a spear-phishing email — an email that is designed to get the user to install a virus, trojan or other malware, reports Pentapostagma.

Often, the emails pretend to be from government agencies, and also come attached with a fake document — such as an IT return — and urges the user to download and open it, reports the news portal.

The firm even claimed that hackers would create fake websites that people working in the targeted organization would generally access.

“The email content attempts to lure the user into extracting the attached zip archive. Upon extraction, the user would see a document file which is in fact an extension spoofed LNK file which is usually seen as shortcuts,” the company said as quoted by the news portal.

“If the user opens the document, the LNK payload gets launched and initiates the malicious activities in the background. To ensure the user is not suspicious, a decoy document is presented to him/her,” it said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.