March 10, 2026 03:01 pm (IST)
Follow us:
facebook-white sharing button
twitter-white sharing button
instagram-white sharing button
youtube-white sharing button
CEC Gyanesh Kumar faces black flags during Kalighat Temple visit in Kolkata amid TMC’s SIR protests | ‘Arrogance will be shattered’: PM Modi warns Mamata Banerjee over remarks on President Murmu | Bloodbath on Dalal Street! Sensex, Nifty crash amid escalating Middle East conflict | Iran appoints Mojtaba Khamenei as new supreme leader amid Middle East tension | Iranian drone strike near Dubai Intl. Airport's terminal forces emergency flight suspensions | 26-year-old Hindu man killed after Holi altercation with Muslim neighbour in Delhi’s Uttam Nagar; four arrested | Zohran Mamdani defends wife amid scrutiny over her 'support' for Palestinian cause | Explosions rock club in Kolkata’s Paikpara, locals claim bombs were stored inside | Iran conflict: White House says US could achieve ‘Operation Epic Fury’ objectives in 4–6 weeks | Sensex, Nifty tumble as global tensions and Dow selloff rattle Indian markets
Phishing
Image: Pixabay

Top Cybersecurity consultant firm claims Pakistani group launches widespread phishing attack on Indians

| @indiablooms | Jul 12, 2021, at 04:59 am

Seqrite, a cybersecurity consultant and the enterprise arm of Quick Heal Technologies, has claimed that a suspected Pakistani group launched  a wave of sophisticated phishing attacks targeting India’s critical infrastructure such as power and telecom, media reports said.

According to the IT security consultant, the initial intrusion chain begins with a spear-phishing email — an email that is designed to get the user to install a virus, trojan or other malware, reports Pentapostagma.

Often, the emails pretend to be from government agencies, and also come attached with a fake document — such as an IT return — and urges the user to download and open it, reports the news portal.

The firm even claimed that hackers would create fake websites that people working in the targeted organization would generally access.

“The email content attempts to lure the user into extracting the attached zip archive. Upon extraction, the user would see a document file which is in fact an extension spoofed LNK file which is usually seen as shortcuts,” the company said as quoted by the news portal.

“If the user opens the document, the LNK payload gets launched and initiates the malicious activities in the background. To ensure the user is not suspicious, a decoy document is presented to him/her,” it said.

Support Our Journalism

We cannot do without you.. your contribution supports unbiased journalism

IBNS is not driven by any ism- not wokeism, not racism, not skewed secularism, not hyper right-wing or left liberal ideals, nor by any hardline religious beliefs or hyper nationalism. We want to serve you good old objective news, as they are. We do not judge or preach. We let people decide for themselves. We only try to present factual and well-sourced news.

Support objective journalism for a small contribution.