Headlines
  • After a temporary suspension, Emirates said the airline "will resume operations."
  • On Saturday, US President Donald Trump said that Iran will be "hit very hard" and that he was thinking about extending the strikes to other targets..
  • At least five ballistic missile launches from Iran have been detected by the Israelis since midnight.
  • Mehrabad Airport in Tehran is hit by strikes
  • The Prince Sultan Air Base was the target of a ballistic missile that Saudi Arabia's military intercepted and destroyed, according to the country's defense ministry.
  • Heavy gunfire on Friday injured three peacekeepers from the United Nations Interim Force in Lebanon inside their base in southwest Lebanon.
  • To put an end to the bloodshed, UN Secretary-General António Guterres urged serious diplomatic negotiations..
  • In a social media post, President Trump said that "no deal" other than "unconditional surrender" will be with Iran.
  • Iran reportedly receives intelligence from Russia on US targets.

More Details

Chinese State Backed Hackers Hyperactive Against India Since Border Tensions in June

By Debdutta Ghosh

China has apparently opened up a new front in its tussle with India apart from the military standoff at the Line of Actual Control in East Ladakh.  

Since the deadly clashes between the Indian and Chinese at the Galwan Valley in Ladakh, there has been a spurt in cyber attacks by Chinese hackers in India, according to reports quoting cyber security experts. 

According to a Singapore-based cyber research firm Cyfirma, since June 18, there has been a 300% spike in the hacking attempts in India that were reportedly supported by the Chinese army.

The bloody clash at the Galwan Valley at the Indo-China border in the Himalayas in the intervening night of June 15-16 between the Indian Army and People’s Liberation Army (PLA) of China saw 20 Indian soldiers, including a commanding officer die. China never disclosed the casualties of Chinese soldiers but multiple sources reports in India and outside have talked of heavy casualties on the Chinese side as well. 

Research by Cyfirma experts have noted that there is a marked shift in hacking against Indian targets since the Galwan Valley clashes, said the firm’s Chairman and CEO Kumar Ritesh. The outcome of the research work by cyber security firm has already been shared by with India’s nodal agency Computer Emergency Response Team (CERT-In) while raising a red flag aganst the increased Chinese dark web activity against India at a time when there is ia border standoff between the armies of the tow countries. 

“Our research has found that targets have changed since June 18 and a lot of activity has been noticed, almost 300% increase from June 18,” said Kumar Ritesh.

“What we are witnessing now is the reconnaissance phase during which they are collecting sensitive information about targets and then profile them, the second phase might see cyber attacks one by one,” he added.

Cyfirma researchers had noted that the cyber attacks against Indian targets were unique. After initially focusing on indigenous Indian industries such as mobile manufacturing, construction, tyres and media companies as well as on some government agencies, hackers backed by the Chinese state moved on from website defacement and reputational damage to stealing sensitive information, sensitive data, customer information and intellectual property. 

Since June when the military tensions between India and China escalated to a war like situation, the researchers also noted that this change in modus operandi had been implemented by the Chinese hackers.

Another characteristic of the attack of the Chinese state backed hackers is its brazenness. Experts noted that while previously, Chinese hackers operated through Pakistan and North Korea-based hackers, since the border tensions the hackers have started to directly engage in the cyber attacks in their efforts to siphon off sensitive data of targeted Indian entities.

“Earlier the Chinese hackers were in a supportive role for Pakistan and North Korea-based hackers but now they are in the frontline and are driving the agenda for cyber attacks,” Kumar Ritesh said. 

In a spate report, cyber security experts in India noted in the month of June over 40,300 cyber attack attempts made in just five days – specifically against agencies and entities in the Indian state of Maharashtra.  

Talking about these attacks, Inspector General of Police of Maharashtra, Yashasvi Yadav, said: “In the past 4-5 days, there is a sudden surge of cyber criminal activity in the Indian cyber space. Resources and sectors such as infrastructure, information and banking have been heavily targeted in this period by Chinese attackers. At least 40,300 cyber attacks have been made in this time, and a large volume of these attacks have originated from Chengdu, the capital city of China’s Sichuan province.”

“These attacks can be divided into three categories – denial of service, IP hijacking and phishing. This has led to the Indian government’s cyber infrastructure being vulnerable right now,” Yadav said while explaining the nature of the cyber attacks perpetrated by the Chinese hackers since the border standoff between New Delhi and Beijing. 

And according to Himanshu Dubey, director of Quick Heal Security Labs: “Over the past few days, we have seen some well-calibrated attacks targeting India’s critical infrastructure using malware that are designed to communicate with CnC (Command & Control) servers based in China. As part of these attacks, crypto miners and Remote Access Tool (RAT) malware are being dropped on victim computers, which enable remote administration and extensive interactions with those devices. Some of the actions include keylogging (a common tactic used to steal credentials), screen capture, privilege escalation (used to gain deep-level access to classified files) and data exfiltration, among others.”

Cyfirma researchers have found out that the most recent spike in cyber attacks on Indian entities were launched from bases in the Chinese capital of Beijing as well as form other cities such as Guangzhou, Shenzhen and Chengdu. 

The two most common and well known Chinese state-sponsored threat actors – Gothic Panda and Stone Panda, do not use any infrastructure in China and they tend to safely operate from their bases in the United States and Europe. They also have moles in Asia. This time however, the researchers of the cyber security firm noted that most of the stooges of both Gothic and Stone Panda were from the PLA who were not afraid to use Chinese army infrastructure to conduct the hack attempts. 

“There was always an interest in India among the Chinese state-sponsored hackers, but they were not aggressive,” said Kumar Ritesh.

The researchers and sleuths of Cyfirma claimed to have decoded vocal statements – some of which said “try to teach them (India) a lesson”. The cyber security firm also confirmed that these Chinese state sponsored hackers generally very clearly have a geopolitical agenda. This time however, these hackers were noted to be supporting the interests of local industries that makes the aim of these attacks very obvious. 

Explaining further Kumar Ritesh said: “Their targets are primarily those Indian firms which have established globally and have an international reputation.” 

Identify the Dog Breed

What type of dog is it? 2. What type of dog is it? 3.What type of cat is it? 4.What type of dog is it? 5.What type of dog is it? Basset Hound 2. Borde
Read More

Fileless Malware

A type of malicious software known as “fileless malware” infects a computer by using reliable apps. As it doesn’t rely on files and leaves no trace, i
Read More

Ragdoll Cats

Large and sturdy, ragdoll cats have a soft, semi-long coat and blue eyes originated in Maine, United States. Coat colors are gold, silver, white, and
Read More

Process Hollowing

Using the covert malware injection technique known as “process hollowing,” an attacker suspends a legitimate process, removes its original code, and r
Read More

Subscribe Our You Tube Channel

Fighting Fake News

Fighting Lies








































Related Article

“Iranian Authorities Use Live Fire, Arbitrary…

In response to the nationwide protests that started on December 28, Iranian authorities have drastic ...
January 7, 2026

UN Urges Iran to Stop Executing…

Despite years of physical and sexual abuse during her marriage as a child bride, Goli Kouhkan, a 25- ...
December 4, 2025

Myanmar Junta Says it Seized 30…

Myanmar’s junta said on Monday it raided one of the country’s most notorious cyberscam centers a ...
October 21, 2025

Myanmar Junta Admits it’s Unable to…

The European Union’s Special Representative for Human Rights Kajsa Ollongren said on Thursday that ...
October 17, 2025

South Korea Issues Travel Ban After…

South Korea issued a “code-black” travel ban for parts of Cambodia on Oct. 15 and dispatched a t ...
October 16, 2025

US, UK Sanction Cambodian Conglomerate, Alleging…

The U.S. and British governments on Tuesday announced a sweeping crackdown on cyber-scam networks in ...
October 15, 2025

Other Article

Pick of the Day

UN Permanent Representative of Iran Briefs…

Amir Saeid Iravani, Permanent Representative of the Islamic Republic of Iran to the United Nations, ...
March 7, 2026
Bizzare News

Malaysian Man Holds Record for Having…

Malaysian Prathab Muniandy has ten more teeth than the typical human. This indicates that he has the ...
March 6, 2026
Pet Corner

Identify the Dog Breed

Identify dog and cat breeds using pictures.ideal match for you.Consider about these facts before pur ...
Prevent Cyber Crime

Fileless Malware

A type of malicious software known as "fileless malware" infects a computer by using reliable apps. ...
Pick of the Day

UN Security Council Meets on Energy,…

Chris Wright, Secretary of Energy of the United States and President of the United Nations Security ...
Bizzare News

Just Before it Collapses, New Jersey…

A horrifying collapse happened minutes after four Jersey Shore police officers were captured on came ...
March 5, 2026

Top