Hacked: Email inboxes of Indian missions in US and China; NDA, DRDO officials too

Status
Not open for further replies.

x86

Explorer
Hacked: Email inboxes of Indian missions in US and China; NDA, DRDO officials too
Taking a dig at cyber security preparedness levels, a hacker, who claims to be based in Sweden, posted online this evening the passwords of 100 email accounts of embassies and government offices across the world, including 13 Indian accounts, containing classified information and correspondence.

Top on the list of passwords that have been posted on Deranged Security give access to email accounts of Indian Ambassadors to China, US, Sweden, Germany, Italy, Oman, Finland besides officials of the National Defence Academy (NDA) and Defence Research and Development Organisation (DRDO).

Other accounts include those of the embassies of Uzbekistan, Iran, Afghanistan, Pakistan, Japan, China, UK and Russia.

To check the authenticity, The Indian Express sent a test mail to the Indian Ambassador in China on her official email ID and, using the password posted online, was able to access it. The email account of the Indian Ambassador to China contained details of a visit by Rajya Sabha member Arjun Sengupta to Beijing earlier this month for an ILO conference. There was also a transcript of a meeting this evening which a senior Indian official had with the Chinese Foreign Minister.

Similarly, accounts of NDA and DRDO officials reveal phone numbers, commercial documents, official correspondence and personal mails. The account of the Indian embassy in Germany contains a query by two IIM (Calcutta) students about safety in the wake of recent racial abuse cases in West Germany.

While it remains unclear how the passwords were accessed by the hacker — he has posted his name on the website as Dan Egerstad from Malmo in Sweden and even gave contact details — Indian experts said that loopholes in POP (post office protocol) mail servers could have been exploited to gain access.

“A POP server that had not been updated for security could have been exploited by the hacker to get usernames and passwords,†said a cyber security expert who did not wish to be named.

Anyone up for trying anyone off the list, if the servers are still not locked off? With my slow connection I'm avoiding but it is hard to check curiosity.
 
Well no classified information is ever revealed or talked about in emails.

The documents usually are personal mails or in most cases queries regarding tender or such which are anyway openly available. It might look fantastically superb information but has little value.

Ofcourse thats no justification for bad passwords :lol:

Btw this is not exactly strange. You can visit one official such site(i won't name it) which even right now is infested with a virus.
 
well ...out of curiosity i tried accessing the drdo email inbox...i got a msg sayin that that particualr inbox was was disabled
 
Cat is out of the bag.....

Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise
By Kim Zetter 09.10.07 | 2:00 AM
Rogue Nodes Turn Tor Anonymizer Into Eavesdropper's Paradise

A security researcher intercepted thousands of private e-mail messages sent by foreign embassies and human rights groups around the world by turning portions of the Tor internet anonymity service into his own private listening post.

A little over a week ago, Swedish computer security consultant Dan Egerstad posted the user names and passwords for 100 e-mail accounts used by the victims, but didn't say how he obtained them. He revealed Friday that he intercepted the information by hosting five Tor exit nodes placed in different locations on the internet as a research project.

Tor is a sophisticated privacy tool designed to prevent tracking of where a web user surfs on the internet and with whom a user communicates. It's endorsed by the Electronic Frontier Foundation and other civil liberties groups as a method for whistleblowers and human-rights workers to communicate with journalists, among other uses.

It's also used by law enforcement and other government agencies to visit websites anonymously to read content and gather intelligence without exposing their identity to a website owner.

But Egerstad says that many who use Tor mistakenly believe it is an end-to-end encryption tool. As a result, they aren't taking the precautions they need to take to protect their web activity.

He believes others are likely exploiting this oversight as well.

"I am absolutely positive that I am not the only one to figure this out," Egerstad says. "I'm pretty sure there are governments doing the exact same thing. There's probably a reason why people are volunteering to set up a node."

Victims of Egerstad's research project included embassies belonging to Australia, Japan, Iran, India and Russia. Egerstad also found accounts belonging to the foreign ministry of Iran, the United Kingdom's visa office in Nepal and the Defence Research and Development Organization in India's Ministry of Defence.

In addition, Egerstad was able to read correspondence belonging to the Indian ambassador to China, various politicians in Hong Kong, workers in the Dalai Lama's liaison office and several human-rights groups in Hong Kong.

Egerstad says it wasn't just e-mail that was exposed but instant messages passed internally between workers and any other web traffic that crossed the network. Among the data he initially collected was e-mail from an Australian embassy worker with the subject line referring to an "Australian military plan."

"It kind of shocked me," he says.

Tor has hundreds of thousands of users around the world, according to its developers. The largest numbers of users are in the United States, the European Union and China.

Tor works by using servers donated by volunteers around the world to bounce traffic around en route to its destination. Traffic is encrypted through most of that route, and routed over a random path each time a person uses it.

Under Tor's architecture, administrators at the entry point can identify the user's IP address, but can't read the content of the user's correspondence or know its final destination. Each node in the network thereafter only knows the node from which it received the traffic, and it peels off a layer of encryption to reveal the next node to which it must forward the connection. (Tor stands for "The Onion Router.")

But Tor has a known weakness: The last node through which traffic passes in the network has to decrypt the communication before delivering it to its final destination. Someone operating that node can see the communication passing through this server.

The Tor website includes a diagram showing that the last leg of traffic is not encrypted, and also warns users that "the guy running the exit node can read the bytes that come in and out of there." But Egerstad says that most users appear to have missed or ignored this information.

Unless they're surfing to a website protected with SSL encryption, or use encryption software like PGP, all of their e-mail content, instant messages, surfing and other web activity is potentially exposed to any eavesdropper who owns a Tor server. This amounts to a lot of eavesdroppers -- the software currently lists about 1,600 nodes in the Tor network.

Egerstad discovered the problem about two months ago when he signed up five servers he owns in Sweden, the United States and Asia to be Tor nodes, and started peeking at the traffic. He was surprised to discover that 95 percent of the traffic that passed through his Tor nodes was not encrypted.

Even more surprising was the number of embassies and other government agencies that were using Tor, and using it incorrectly.

That prompted Egerstad to narrow his search to e-mail correspondence with a focus on government agencies. He wrote a script to search for .gov domains and keywords such as "embassy," "war" and "military," and focused on sniffing port-25 traffic, the port through which e-mail passes.

He collected between 200 and 250 accounts belonging to embassies and government agencies that were sending passwords and the content of correspondence in the clear. None of them belonged to U.S. embassies or government agencies.

Among the data he found in the correspondence was a spreadsheet listing passport numbers and personal information about the passport holders, as well as sensitive details about meetings and activities among government officials.

Egerstad contacted one account holder about his vulnerability but was ignored, he says. So on Aug. 30 he posted 100 of the accounts and passwords online to get the word out, but kept largely mum about how he'd obtained the information.

Since posting the data, he says only one victim has contacted him to find out what they were doing wrong and learn how to fix it: Iran. In addition to Iran's Ministry of Foreign Affairs, the country's embassies in Ghana, Kenya, Oman and Tunisia were swept up by Egerstad's experimental surveillance.

Shava Nerad, the development director for the nonprofit group that supports Tor, admits the group needs to produce better documentation for users to make the risks of the system clearer. But she adds that people in high-risk environments, such as embassies, should understand those risks already and should be encrypting their communication on their own.

"If you're in a position like that handling sensitive data and you're working for the government," she says, "it is irresponsible to send that data unencrypted. They should institute practices that educate their users and ensure the privacy of the data by going through encrypted VPNs."

Egerstad says he has shut down his Tor nodes.
 
Status
Not open for further replies.