March 12, 2026 10:29 pm (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
America’s flip-flop on Russian oil: How Washington sends conflicting signals to India | Big diplomatic win! Iran allows Indian oil tankers through the Strait of Hormuz | ‘It was over in the first hour’: Trump declares victory in Iran war, says ‘nothing left to target’ | Indian-origin shopkeepers face targeted attacks in Wembley; Somali men suspected | Iran pulls out of 2026 FIFA World Cup amid war with US-Israel | Supreme Court allows first-ever passive euthanasia for 32-year-old man in coma for 13 years | As Iran-US war disrupts global gas supply, India issues guidelines to manage shortages | LPG crisis hits metros: Commercial cylinder shortage triggers panic as govt prioritises domestic supply | Iran war disrupts LPG supplies, restaurants in major Indian cities edge towards shutdown | ‘How dare you question judicial officers?’: SC raps Bengal SIR pleas, orders appellate tribunals for voter list appeals
Phishing
Image: Pixabay

Top Cybersecurity consultant firm claims Pakistani group launches widespread phishing attack on Indians

| @indiablooms | Jul 12, 2021, at 04:59 am

Seqrite, a cybersecurity consultant and the enterprise arm of Quick Heal Technologies, has claimed that a suspected Pakistani group launched  a wave of sophisticated phishing attacks targeting India’s critical infrastructure such as power and telecom, media reports said.

According to the IT security consultant, the initial intrusion chain begins with a spear-phishing email — an email that is designed to get the user to install a virus, trojan or other malware, reports Pentapostagma.

Often, the emails pretend to be from government agencies, and also come attached with a fake document — such as an IT return — and urges the user to download and open it, reports the news portal.

The firm even claimed that hackers would create fake websites that people working in the targeted organization would generally access.

“The email content attempts to lure the user into extracting the attached zip archive. Upon extraction, the user would see a document file which is in fact an extension spoofed LNK file which is usually seen as shortcuts,” the company said as quoted by the news portal.

“If the user opens the document, the LNK payload gets launched and initiates the malicious activities in the background. To ensure the user is not suspicious, a decoy document is presented to him/her,” it said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.