CAUTION: Hackers Are Creating Fake Evidence To Frame Innocents

The power of human beings to use their intelligence to apply evil is a sad thing for humanity. This time, hackers are developing criminal evidence to blame innocent people's devices.

Such false evidence manufactured by this group of hackers seeks to criminalize to the point of creating an allegation for the arrest of victims. Among those attacked by them are Indian activists, lawyers and academics.

see more

8 signs that show that anxiety was present in your…

School director intervenes delicately when noticing a student wearing a cap in…

The security company SenrinelOne has sought to investigate the actions of this group of criminals, which has been nicknamed “ModiefiedElephant” and has been operating for about ten years.

See more at: Alert: 7 million data were leaked by subtitle download site after hacker action

What is the meaning of this practice?

In the year 2018, Maoist activist Rona Wilson and an associated group were arrested by the Indian security service and charged with conspiracy against the government. Upon searching for evidence, Word documents were found on Wilson's computer detailing plans to assassinate the Prime Minister.

However, after analysis of the device, it was proved that the documents were fake and planted by malware. For SenrinelOne researchers, hackers were primarily responsible.

This case took on large proportions and several security companies began to investigate the group. Thus, the conclusion was that Wilson was the victim of a digital manipulation, which was implemented over four years to attack the activist's device.

However, Wilson is still in prison, even though the falsehood of the documents has already been proven. The government, even with requests for parole, still denies them, claiming to have more evidence against the activist.

What techniques are used?

Phishing emails tailored to victims' interests are the main means by which hackers act. As soon as victims receive them, the malicious emails are loaded.

So, from viruses, they install easy-to-use programs capable of hijacking data from computers. In addition, the group makes use of keyloggers and Android malware, which pretends to be a secure messaging tool or news, anything that is capable of instigating the victim's attention.

Finally, it is still very difficult to find who is behind the group. The security company thinks of people who obey the interests of the Indian government itself, as the attacks are always directed at political people.

Mayombe: summary, analysis, the author

Mayombe: summary, analysis, the author

mayombe is a book by Angolan writer Pepetela. It tells the stories of guerrillas gathered at a ba...

read more
Sleepwalking land: summary, analysis, the author

Sleepwalking land: summary, analysis, the author

sleepwalking land is a novel by Mozambican writer Mia Couto. The book was published for the first...

read more
Campo Grande: general data, map, flag, history

Campo Grande: general data, map, flag, history

Large field is a Brazilian municipality located in the Midwest region. Plays the role of capital ...

read more
instagram viewer