How Pakistani cyber jihadis honeytrapped IAF officer for classified information

IANS  |  New Delhi 

It was a group of 300 ISI cyber 'jihadis' led by the brothers of who honeytrapped and blackmailed Group Marwaha to extract Indian defence secrets from the IAF who once trained intelligence officers and naval commandos, police said on Friday.

A Police officer, part of the team investigating the case, told IANS that Indian (IAF) Marwaha -- posted at the in -- was lured by Sajid and Abid and their group members, including some women, who used to chat with Marwaha on by posing as sex models.

According to the police officer, Marwaha, 51, shared information and documents with two Pakistani agents who chatted with him on Facebook, pretending to be women. The fake accounts, in the names of 'Kiran Randhawa' and 'Mahima Patel', were used to lure him.

During sex chats, Marwaha passed on the secret information to the group run by Pakistan's (ISI).

The said the brothers had earlier targeted thousands of Indian officers by sending them chat requests through Trojan malware disguised as to hack and gain access to the users' systems.

Users are typically tricked by some form of social engineering into loading and executing the malware on their systems.

A similar application was also used by Pakistani terrorists to access Indian troop's movement before and after the terror attack on the IAF base in Pathankot in January 2016, the said.

"brothers used this application, which is basically a data-stealing software, to take control of the user's phone," he said.

The Karachi-based cyber unit observes the of Indian defence officials by tracking their activities.

"The officers using of Chinese origin are particularly under their radar.

Those visiting porn sites or befriending women using various and clicking on links on these sites are being monitored closely," he said.

The said many other hacking softwares are used by the members of this cyber unit. Some of the commonly used are free proxy, squid, anon proxy, shadowsoc, tiny proxy, nginx, stunnel, internet junkbuster, proxomitron, safe squid, ghost proxy, steady proxy and others.

These softwares help hackers dodge the investigation agency by re-routing their IP addresses, making the origin of a cybercrime almost untraceable.

The Group was first detained by the IAF on January 31 after his activities were found "suspicious".

The later approached the Police to investigate.

He allegedly used his to click pictures of classified documents pertaining to the and then sent them via WhatsApp.

According to a Special Cell officer, befriended the ISI agents posing as women models and chatted with them regularly on WhatsApp, exchanging intimate messages.

The ISI agents also blackmailed him after he sent them his nude pictures and videos, the said.

"The documents which Marwaha shared mostly dealt with training and combat-related air exercises. We also found he shared documents of the exercise 'Gagan Shakti'," the added.

The IAF had a good track record so far and had trained officers of the Marine Commandos (Marcos) of the and intelligence wing of the IAF.

(can be contacted at sanjeev.p@ians.in)

--IANS

sp/sar/tsb/bg

(This story has not been edited by Business Standard staff and is auto-generated from a syndicated feed.)

First Published: Fri, February 09 2018. 21:48 IST