'A Hacker Group Has Been Framing People for Crimes They Didn't Commit' (gizmodo.com) 28
A "shadowy hacker group" named Modified Elephant has been targeting people throughout India "for at least a decade," reports Gizmodo, "sometimes using its digital powers to plant fabricated evidence of criminal activity on their devices. That phony evidence has, in turn, often provided a pretext for the victims' arrest."
They cite a new report from cybersecurity firm Sentinel One "illuminating the way in which its digital dirty tricks have been used to surveil and target "human rights activists, human rights defenders, academics, and lawyers" throughout India. The most prominent case involving Elephant centers around Maoist activist Rona Wilson and a group of his associates who, in 2018, were arrested by India security services and accused of plotting to overthrow the government. Evidence for the supposed plot — including a word document detailing plans to assassinate the nation's prime minister, Narendra Modi — was found on the Wilson's laptop. However, later forensic analysis of the device showed that the documents were actually fake and had been artificially planted using malware. According to Sentinel researchers, it was Elephant that put them there.
This case, which gained greater exposure after being covered by the Washington Post, was blown open after the aforementioned laptop was analyzed by a digital forensics firm, Boston-based Arsenal Consulting. Arsenal ultimately concluded that Wilson and all of his so-called co-conspirators, as well as many other activists, had been targeted with digital manipulation....
According to the Sentinel One's report, Elephant uses common hacking tools and techniques to gain a foothold in victims' computers. Phishing emails, typically tailored to the victim's interests, are loaded with malicious documents that contain commercially available remote access tools (RATs) — easy-to-use programs available on the dark web that can hijack computers....
An entirely different group is believed to have conducted similar operations against Baris Pehlivan, a journalist in Turkey who was incarcerated for 19 months in 2016 after the Turkish government accused him of terrorism. Digital forensics later revealed that the documents used to justify Pehlivan's charges had been artificially implanted, much like those on Wilson's laptop.
They cite a new report from cybersecurity firm Sentinel One "illuminating the way in which its digital dirty tricks have been used to surveil and target "human rights activists, human rights defenders, academics, and lawyers" throughout India. The most prominent case involving Elephant centers around Maoist activist Rona Wilson and a group of his associates who, in 2018, were arrested by India security services and accused of plotting to overthrow the government. Evidence for the supposed plot — including a word document detailing plans to assassinate the nation's prime minister, Narendra Modi — was found on the Wilson's laptop. However, later forensic analysis of the device showed that the documents were actually fake and had been artificially planted using malware. According to Sentinel researchers, it was Elephant that put them there.
This case, which gained greater exposure after being covered by the Washington Post, was blown open after the aforementioned laptop was analyzed by a digital forensics firm, Boston-based Arsenal Consulting. Arsenal ultimately concluded that Wilson and all of his so-called co-conspirators, as well as many other activists, had been targeted with digital manipulation....
According to the Sentinel One's report, Elephant uses common hacking tools and techniques to gain a foothold in victims' computers. Phishing emails, typically tailored to the victim's interests, are loaded with malicious documents that contain commercially available remote access tools (RATs) — easy-to-use programs available on the dark web that can hijack computers....
An entirely different group is believed to have conducted similar operations against Baris Pehlivan, a journalist in Turkey who was incarcerated for 19 months in 2016 after the Turkish government accused him of terrorism. Digital forensics later revealed that the documents used to justify Pehlivan's charges had been artificially implanted, much like those on Wilson's laptop.
Funny that these hacker groups (Score:5, Interesting)
Re: Funny that these hacker groups (Score:2)
Around the world the right is almost 100% of the time pro-corporate. The US case, in which the right is kind of anti-corporate, and the left it kind of pro-corporate, is a very odd exception to the rule.
Comment removed (Score:5, Insightful)
Re: (Score:2, Insightful)
The left isn't pro-corporate in America, and the right certainly isn't anti-corporate.
That's because there isn't really a "left" in the US. In the full political spectrum, Democrats are center-right and Republicans are right. Democrats can be called "left" only in relative terms, as being "to the left of" the GOP, but that's about it. So, what you have over there is two distinct rights with mostly distinct preferences over which corporates to favor, and which to oppose, and a little overlap.
The distinction on which corporates to favor and oppose is what gives the GOP a certain "flavor" of be
There is a left here (Score:2)
A great example of this is reddit's r/politics thread, where only stories from a few major news outlets are allowed, effectively limiting political discourse for the sake of making the mod's jobs easier.
This is nothing, compared to EU/USA... (Score:1, Troll)
Childporn servers across NATO members:
https://www.reddit.com/r/consp... [reddit.com]
target "harvest" on a massive scale:
https://www.reddit.com/r/consp... [reddit.com]
and much more:
https://www.reddit.com/r/consp... [reddit.com]
Re:This is nothing, compared to EU/USA... (Score:4, Insightful)
Re: (Score:2)
I thought only police planted evidence. (Score:3)
Re: I thought only police planted evidence. (Score:4, Informative)
Spouses? No need to imagine, this is as old as courtrooms.
An example was my mother. She wanted custody of my brother and me in the early 1980's and absolutely zero visitation rights for my father. This was in then ultraconservative Brazil, amidst a right-wing military dictatorship, with judges appointed by the military, so, very easy. She paid a transvestite prostitute to appear in court and explain to the judge the torrid relationship he had with my father, and paid two other persons to testify to the veracity of the first one, saying they saw my father visiting the prostitute's apartment etc. That very day she got exactly what she wanted: 100% custody of us, and no visitation rights for my father.
Nothing new. Just the same old thing, but "on a computer!" and "on the Internet!" Probably patentable even.
Re: (Score:2)
Spouses? No need to imagine, this is as old as courtrooms.
An example was my mother. She wanted custody of my brother and me in the early 1980's and absolutely zero visitation rights for my father. This was in then ultraconservative Brazil, amidst a right-wing military dictatorship, with judges appointed by the military, so, very easy. She paid a transvestite prostitute to appear in court and explain to the judge the torrid relationship he had with my father, and paid two other persons to testify to the veracity of the first one, saying they saw my father visiting the prostitute's apartment etc. That very day she got exactly what she wanted: 100% custody of us, and no visitation rights for my father.
Right.
And now that we have no-fault divorce (er, not exactly from the right), she would today have had to frame your father for child abuse. So much better!
It's almost like it's the framing and false accusations that are wrong ...
Re: (Score:3, Funny)
Re: (Score:2)
Re: (Score:2, Informative)
Just an educated guess (Score:2)
A Maoist activist? The phone is probably loaded with real evidence. No need to fabricate any.
Oldest excuse in the book (Score:2)
âoeMy account was hacked.â
Politicians of all flavours in India say this when caught with something unsavory, be it âoelikingâ a porn image or when caught with terrorist materials.
In this particular case one thing does not make sense. How did this analysis take place when the computer in question is supposed to be in the possession of the investigating agency?
Re:Oldest excuse in the book (Score:5, Interesting)
Re: (Score:2)
I did read the report.
After some initial sarcasm, I was wondering how these analysts got hold of this Wilson fellow's disk images when the devices are supposed to be in the possession of the NIA
Great (Score:2)
Another story about the Clintons that will be ignored.
Same as the US (Score:2)