• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  News  /  Cyber Intelligence averted major Internet service disruption in India
Cyber Intelligence averted major Internet service disruption in India
29 September 2017

Cyber Intelligence averted major Internet service disruption in India

Written by Rohit Srivastwa
Rohit Srivastwa
News
7

A breach at IRINN systems could have affected India’s over 6000 ISPs, Government and Private Organisations.

We at Seqrite’s Cyber Intelligence Labs (https://seqrite.com) working closely with our Partner, seQtree InfoServices (https://seqtree.com/) recently tracked a broadcast advertisement on a Darknet platform where an underground actor had advertised access to the servers and database dump of an unspecified Internet Registry. Following a detailed research the team identified the affected organization as India’s National Internet Registry: IRINN (Indian Registry for Internet Names and Numbers) which comes under NIXI (National Internet Exchange of India). The sample screenshots (shared by actor) confirmed that compromise was real.

As per the standard protocol, we have contacted the appropriate agencies and sensitized them about the possible breach at IRINN.

Here is the detailed sequence of events related to this compromise:

  • Upon noticing the broadcast advertisement, seQtree and Seqrite teams started gathering background research on the actor but did not yield any concrete information.
  • But the team didn’t get any relevant data even after conducting deep research and it appeared that this actor’s persona was created recently. This is an ongoing trend that the team has noticed with recent data breaches.
  • The team then contacted the actor for further details, posing as an interested buyer. Initially the actor was not willing to disclose the name of affected Internet Registry, however, later he agreed to share a small sample of email list from the allegedly compromised database.
  • In the sample, the team noticed email address of a prominent Indian technology firm and another email address was from Indian government. Then the team asked for complete/extensive emails list.
  • Eventually, the actor agreed to share a text file containing the emails of users/organizations affected, allegedly from the compromised database(s). The text file contained a list of approx. 6000 emails.
  • It was observed some of the most important and high-profile organizations featured in the list. At this point, the team first thought the possibility of the affected organization being India’s National Internet Registry: IRINN (Indian Registry for Internet Names and Numbers) which comes under NIXI.
  • To confirm our suspicion, we probed the actor further. The actor agreed to share screenshots which confirmed our suspicion that the compromise/breach is, unfortunately true and IRINN is the affected organization.
  • The actor also hinted on the chat that if he doesn’t find any interested buyer, actor will consider posting this on Darknet forum(s)/marketplace(s).
  • If he gets an interested buyer, then attack on the system could have disrupted Internet IP allocation and in-turn the complete Internet in India.

This can be a major tool of mass disruption if a state actor gets hands on it.

Below is the list of selective few organizations whose services could have been disrupted and also the sample screenshots to confirm our observation.

Indian Government Telecom/ ISPs Financial Organisations Technology Firms
UIDAI (Aadhaar) Idea Telecom Bombay Stock Exchange (BSE) Flipkart

 

DRDO Aircel Mastercard / Visa Ernst & Young (E&Y)
Reserve Bank of India BSNL SBI TCS
ISRO You Broadband HDFC Wipro
ISRO Satellite Centre (ISAC) Spectranet ICICI Prudential Mutual Fund VMWare
Employees’ Provident Fund Organisation Hathway BNY Mellon eClerx
Various Indian state government portals (e.g. Maharashtra Online, MP Online) Sify IDBI Bank Zoho
Vikram Sarabhai Space Centre Tikona Federal Bank  
National Centre for Antarctic and Ocean Research   Royal Bank of Scotland  
    Edelweiss Tokio  
    Dena Bank  
    IDFC Bank  
    Canara Bank

Screenshots

Some of the censored screenshots (we have blurred the personal details) are attached below,

seqrite-blog-1 Fig. (1)

 

seqrite-blog-2

Fig. (2)

seqrite-blog-3

Fig. (3)

Assessment

We assessed the following from our research and the shared screenshots:

  1. The actor has a database related to IRINN, as well as some database related to APNIC (“apnicdb” in screenshot 1).
  2. The price set by actor for the database was/is 15BTC (approx. 61500USD in present rate).
  3. The actor can access other’s portal on IRINN website. This might indicate that along with email addresses, the actor also has access to passwords (as visible in screenshot 2 and 3).
  4. The actor can possibly control IP/ASN allocation/de-allocation for various organizations (as visible in screenshot 2).
  5. Actor might have access to internal sensitive documents uploaded by IRINN users (a PDF file is visible in screenshot 3).

Further Update as on 28th September 2017:

Our team noticed a post in Darknet forum, which provides clear indication that actor has started advertising about availability of this information on public Darknet forums as well. Screenshots are below:

seqrite

Fig. (4)

seqrite

Fig. (5)

In the above screenshots, we can see that the actor is asking for 15 BTC in exchange of the IRINN’s database.

Implications

Assessing from the screenshot and emails list shared with our team, we believe this compromise could have serious implications for the affected organizations.

The forum post suggests that the actor has the Username, Passwords, Emails, Organization names, Invoices and Billing documents, etc. among other documents.

If an actor gets access to any organization’s IRINN portal, they might be able to de-allocate/delete IP/ASN, therefore, causing outage and Denial-of-service for the users and organizations.

Actions

We have notified appropriate agencies in the Government and have got an acknowledgement that the issue has been taken care of.

Hopefully this will not lead to any disruption. Proactive monitoring and reporting in any such case can always avert major damages.

All Intellectual Property Right(s) including trademark(s), logo(s) and copyright(s) are properties of their respective owners. Copyright © 2017 Quick Heal Technologies Ltd. All rights reserved.

 Previous PostEncryption: Improve information security by turning it into codes
Next Post  Gateway protection: Next-Gen security solution
Rohit Srivastwa

About Rohit Srivastwa

Rohit Srivastwa is Senior Director, Cyber Education and Services at Quick Heal Technologies Ltd. He is a security evangelist and specialist in IT infrastructure,...

Articles by Rohit Srivastwa »

Related Posts

  • CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild

    June 10, 2022
  • Zero-day Vulnerability

    Threat Advisory: CVE-2022-30190 ‘Follina’ – Severe Zero-day Vulnerability discovered in MSDT

    June 3, 2022
  • Advisory on Russia-Ukraine Conflict-Related Cyberattacks

    March 15, 2022
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies