The power of human beings to use their intelligence to apply evil is a sad thing for humanity. This time, hackers are developing criminal evidence to blame innocent people's devices.
Such false evidence manufactured by this group of hackers seeks to criminalize to the point of creating an allegation for the arrest of victims. Among those attacked by them are Indian activists, lawyers and academics.
see more
8 signs that show that anxiety was present in your…
School director intervenes delicately when noticing a student wearing a cap in…
The security company SenrinelOne has sought to investigate the actions of this group of criminals, which has been nicknamed “ModiefiedElephant” and has been operating for about ten years.
See more at: Alert: 7 million data were leaked by subtitle download site after hacker action
What is the meaning of this practice?
In the year 2018, Maoist activist Rona Wilson and an associated group were arrested by the Indian security service and charged with conspiracy against the government. Upon searching for evidence, Word documents were found on Wilson's computer detailing plans to assassinate the Prime Minister.
However, after analysis of the device, it was proved that the documents were fake and planted by malware. For SenrinelOne researchers, hackers were primarily responsible.
This case took on large proportions and several security companies began to investigate the group. Thus, the conclusion was that Wilson was the victim of a digital manipulation, which was implemented over four years to attack the activist's device.
However, Wilson is still in prison, even though the falsehood of the documents has already been proven. The government, even with requests for parole, still denies them, claiming to have more evidence against the activist.
What techniques are used?
Phishing emails tailored to victims' interests are the main means by which hackers act. As soon as victims receive them, the malicious emails are loaded.
So, from viruses, they install easy-to-use programs capable of hijacking data from computers. In addition, the group makes use of keyloggers and Android malware, which pretends to be a secure messaging tool or news, anything that is capable of instigating the victim's attention.
Finally, it is still very difficult to find who is behind the group. The security company thinks of people who obey the interests of the Indian government itself, as the attacks are always directed at political people.