Is India Hackers' Refuge?
By siliconindia
|
Tuesday, 04 October 2011, 02:05 IST |
1 Comments
"Hacker", this word at once brings to our mind a radiant software programmer with a craving to save mankind. There are a few varieties to the list like Grey Hat, White Hat, Black Hat, Mules Herders etc.
A White Hat gets into networks with authorization, a Grey Hat works as a White Hat but may get into networks without permission for fun or profit, and a Black Hat enters networks without permission and is frequently paid. Script Kiddies are those starting out in the information security world, and Mules are recruited by Herders to acknowledge money looted during online frauds.
Topping the list are the hackers with political belief. Anonymous, is the most famous of such that uses hacker attacks to control governments and corporations to become more transparent. It was Anonymous that attacked the Web sites of Visa and MasterCard when they stopped accepting donations meant for Wikileaks' Julian Assange.
Hardly a year ago, Anonymous got into a scrap with an Indian company called Aiplex, specialising in anti-piracy operations. The company is hired by a variety of entertainment companies to go after sites from which you could download music or movies illegitimately.
The Office of His Holiness The Dalai Lama, the leader of the Tibetan Government-in-Exile in India at Dharamshala, is taught to resist most temptations, but the routine email is difficult to avoid. If an email from a known fellow Tibetan with an attachment "Translation of Freedom Movement ID Book for Tibetans in Exile.doc" arrives, there is no way The Dalai Lama's staff is not going to open it. They clicked on the attachment, opened it and brought plague upon themselves. It didn't take long to understand that most computers of the Tibetan Government-in-Exile were 'double agents'; functioning normally, but every now and then ferreting sensitive information out to their 'command and control' computers, most of which were in China. It all started the moment one of the monks clicked on a file, allowing a slimy software code to install itself on his computer and establish connections with computers in China. This malicious software malware would first locate important documents on the infected computer and upload them to its controllers, then try to spread itself further by sending infected emails to the contacts stored on the machine.