May 11, 2026 11:01 am (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
Big defence boost: India successfully tests advanced Agni MIRV missile | India, Singapore unite for tough action against terror and transnational crime | TVK crosses majority mark with VCK, IUML support | I bow before Bengal: PM Modi’s powerful gesture at Suvendu Adhikari’s oath goes viral | Bengal turns a new page: Suvendu Adhikari takes oath as CM amid massive NDA show of strength | Cloud over Tamil Nadu government formation as Governor asks Vijay to prove majority | 1 Year of Operation Sindoor: PM Modi says it showed India’s firm response to terror | ‘Larger conspiracy ahead of PM Modi’s visit’: BJP on killing of Suvendu Adhikari’s aide | ‘My car was on OLX for sale’: Siliguri owner says number plate used in Suvendu aide assassination may have been cloned online | ‘Pre-planned political assassination’: BJP’s Swapan Dasgupta on Suvendu aide’s killing
Phishing
Image: Pixabay

Top Cybersecurity consultant firm claims Pakistani group launches widespread phishing attack on Indians

| @indiablooms | Jul 12, 2021, at 04:59 am

Seqrite, a cybersecurity consultant and the enterprise arm of Quick Heal Technologies, has claimed that a suspected Pakistani group launched  a wave of sophisticated phishing attacks targeting India’s critical infrastructure such as power and telecom, media reports said.

According to the IT security consultant, the initial intrusion chain begins with a spear-phishing email — an email that is designed to get the user to install a virus, trojan or other malware, reports Pentapostagma.

Often, the emails pretend to be from government agencies, and also come attached with a fake document — such as an IT return — and urges the user to download and open it, reports the news portal.

The firm even claimed that hackers would create fake websites that people working in the targeted organization would generally access.

“The email content attempts to lure the user into extracting the attached zip archive. Upon extraction, the user would see a document file which is in fact an extension spoofed LNK file which is usually seen as shortcuts,” the company said as quoted by the news portal.

“If the user opens the document, the LNK payload gets launched and initiates the malicious activities in the background. To ensure the user is not suspicious, a decoy document is presented to him/her,” it said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.