IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

North Korean hackers allegedly targeted Indian space agency

The Dtrack malware infection successfully disrupted an active lunar mission

Rocket blasting off to Mars

At least five critical Indian government agencies have been reportedly targeted by North Korean hackers in recent months, including its atomic regulatory board and space agency.

The Indian Space Research Organisation (ISRO) was alerted by a US cyber security company to a potential malware breach in early September, according to the Indian Express. The alert suggested that cyber criminals had infiltrated master 'domain controllers' at the Kudankulam nuclear power plant and the ISRO using the same malware strain.

The incident also may have had an effect on a failed lunar landing mission, Chandrayaan 2, which was due to touch down approximately 100 hours after the attack struck, sources who spoke with the newspaper said.

This mission was due to make a soft-landing on the Moon's South Pole on 7 September but lost contact with the earth station.

India's National Cyber Coordination Centre, similar in nature to the UK's National Cyber Security Centre (NCSC), was tipped off on 3 September about the attacks, with the power plant breach becoming public knowledge just last week.

The attackers were among at least five launched against India's critical national infrastructure, according to the founder of cyber security firm Security Brigade Yash Kadakia, speaking with the FT.

The malware strain itself was identified as Dtrak, which could allow cyber criminals to gain control over any and all infected devices. The 'domain controllers' targeted were server computers that responded to security authentication requests.

The Kudankulam plant initially said no cyber attack on its systems were possible, but the Nuclear Power Corporation of India which runs the plant conceded later that an infection had spread into the administrative network.

People within the respective agencies are reported to have opened phishing emails that were sent by the hackers, which led to the malware infiltrating agency systems.

Dtrack has been associated with activity by the Lazarus group, Kaspersky's SecureList platform suggests. The Lazarus Group has, in turn, been previously associated with the North Korean state.

A variation of the strain was last used on a widespread scale in 2018 in the form of a banking malware that targeted Indian banks. Analysis by Kaspersky showed the malware was designed to be planted on ATMs, where it could read and store information from cards inserted into the individual machines.

This attack may have been part of its 'FASTCash' scheme, identified by Symantec, through which Lazarus aimed to steal millions of dollars from ATMs across the world.

Featured Resources

Meeting the future of education with confidence

How the switch to digital learning has created an opportunity to meet the needs of every student, always

Free Download

The Total Economic Impact™ of IBM Cloud Pak® for Watson AIOps with Instana

Cost savings and business benefits

Free Download

The business value of the transformative mainframe

Modernising on the mainframe

Free Download

Technology reimagined

Why PCaaS is perfect for modern schools

Free Download

Most Popular

How to boot Windows 11 in Safe Mode
Microsoft Windows

How to boot Windows 11 in Safe Mode

7 Jun 2022
Attracting and retaining talent through training
Sponsored

Attracting and retaining talent through training

13 Jun 2022
Delivery firm Yodel disrupted by cyber attack
cyber attacks

Delivery firm Yodel disrupted by cyber attack

21 Jun 2022