Dismiss Notice
Welcome to IDF- Indian Defence Forum , register for free to join this friendly community of defence enthusiastic from around the world. Make your opinion heard and appreciated.

Sukhoi likely downed by cyber weapons

Discussion in 'Indian Air Force' started by DrSomnath999, May 28, 2017.

Thread Status:
Not open for further replies.
  1. DrSomnath999

    DrSomnath999 Major RESEARCHER

    Joined:
    Jun 11, 2011
    Messages:
    2,659
    Likes Received:
    1,510
    Country Flag:
    France
    ‘Sukhoi likely downed by cyber weapons’

    SOURCE: SUNDAY GUARDIAN LIVE
    [​IMG]
    Analysts based in the vicinity of New York and St Petersburg warn that the loss, days ago, of an advanced and mechanically certified as safe, Sukhoi 30 fighter aircraft, close to the border with China may be the result of “cyber-interference with the onboard computers” in the cockpit. This may explain why even the pilots may have found it difficult to activate safety ejection mechanisms, once it became obvious that the aircraft was in serious trouble, as such mechanisms too could have been crippled by computer malfunctions induced from an outside source.

    They point to the apparent loss of five Army vehicles, “due (according to the authorities) to a misfired mortar strike” in the same zone, saying that a single mortar round would not have enough firepower to take out such a large number of vehicles. They add that the possibilities are that the damage may have been caused by a larger projectile guided by electronic systems that may have been interfered with during flight. Given the range and complexity of cyber interference, the source of the attack could have been from thousands of kilometres or from only a few hundred metres away.

    These analysts warn that although India spends over Rs 200,000 crore on defence through the armed forces and another Rs 100,000 crore on security via police units, hardly Rs 4,700 crore gets spent on cyber capability. The analysts spoken to point out that almost all this gets expended on foreign vendors, rather than domestic producers. However, this reliance on foreign shores for defence and security is across the board, so far as capital expenditure is concerned, in contrast to China, which has almost entirely indigenised its capabilities over the past 15 years.

    The international analysts spoken to, who are based in Russia and the United States, two of the four giants in the cyber field (the others being Israel and China), point to the devastating effect of the lightning shutdown of the Northern Power Grid on two separate occasions in August 2012. These were attributed by authorities to an “overdrawing” of power by Uttar Pradesh, omitting to consider the fact that such excess power consumption is routine, and that in the past, UP had withdrawn far more electricity from the grid than had been the case when it tripped.

    They say that it is probable that a cyber-related malfunction of a key gauge may have occurred, leading to the breakdown in supplies. It is pertinent to recall (to illustrate cyber capabilities) that it was at that time that the US and Israel introduced Stuxnet into even non-internet related control systems in the nuclear industry in Iran. As a consequence, the nuclear process gauges showed acceptable speeds, even while remote commands raised the speed of certain processes to unsafe levels, thereby leading to a shutdown in operations. Of course, they add that it is “next to impossible” that either the US or Israel were behind the Northern Grid power outage, although both have the capability to inflict such damage on essential civilian infrastructure, and that the Stuxnet example was only given as an illustration of the lethality of cyber weaponry.

    The impact of cyber warfare on complex machinery may be judged by the crippling of the USS Donald Cook in April 2014 by electronic interference sourced from a high-flying Sukhoi-24. Exactly a year later, yet another Sukhoi disabled the USS Theodore Roosevelt (an aircraft carrier armed with multiple defensive and safety mechanisms) in the Baltic Sea. Both naval vessels had to be towed to safety, as their onboard propulsion systems got damaged by electronic interference. Other large-scale disruptions caused by cyber warfare include the crippling of operations of Stockholm airport for three days last year. There had also been large-scale power outages in the US more than a decade ago, after the worst of which a warning was conveyed by US authorities to the (state) perpetrator that the next time around, there would be a disproportionate cyber reaction to the event, targeting the offending country. Needless to say, that was the last time large-scale disruptions of the same kind occurred within the US.

    Given the push towards digitalisation by the Narendra Damodardas Modi government since 26 May 2014, the realm of cyberspace has become critical in the security and economic matrix of the country. In this context, cyber theft from banks is a vulnerability which needs to be eliminated. However, as yet authorities have adopted a conventional approach towards such crimes, as for illustration the overnight siphoning of Rs 1,200 crore ($171.2 million) from Union Bank of India on 20 July 2016 through seven “swift” transactions. $166 million was taken from Union Bank’s account in New York Citibank, while 5 million was removed from J.P. Morgan Chase, again in New York. The money was wired to seven accounts: Mrs Pornjit, SIAM Bank, Thailand; Mr Sithonno, Canadia Bank, Cambodia; Sactec Corporation, Sinopec Bank, Taiwan; Mr Cheng Nesgig, Indo-China Bank, Cambodia; and three other accounts. During the same period, Bank of Maharashtra is reported to have lost Rs 25 crore through fraud in their digital payments mechanism.

    Interestingly, the same year, a Bangladesh bank lost $89 million in the same manner as Union Bank of India. While the Bangladesh authorities visited Sri Lanka to bring the account holders (into which the cash had been transferred) to justice, thus far authorities in India do not appear to have been to the locations where the money was sent, to interview the recipients. In the Indian cases, authorities focused on backdoor diplomacy to try and get back some of the money stolen, rather than aggressively pursue the perpetrators and the beneficiaries. As a consequence, India is widely regarded globally as a soft target for cybercrime, despite harsh laws on the subject. “What counts is not law but implementation and the capability to react, and in both, India has remained well below its size and potential”, these experts claim.

    Based in the vicinity of New York and St Petersburg, they warn that the capabilities of Indian authorities in the cybercrime realm are of a “Fourth World” standard. They claim that only Open Source tools are used in this country to track depredators, including by locating IP addresses.
    However, such addresses can be easily disguised by experienced hackers, thereby leading to the wrong locations being blamed for a cyber attack. Hence, in case an attack comes from a particular country, it is close to impossible for Indian authorities to identify the source, which means that there is no way of knowing who to complain to and about whom. Unlike the US, Russia, Israel or China, where each has the capability to penetrate through such dodges and establish where exactly an attack originated from, India has thus far relied on outside police forces to deal with cybercrime in this country, many of which are in locations compromised by graft and connivance with criminal gangs.

    Globally, geopolitics specialists consider Prime Minister Narendra Modi to be among the top four global leaders (the others being Donald Trump, Xi Jinping and Vladimir Putin). They, therefore, expect that India under PM Modi will soon rectify the vulnerability caused by decades of neglect of the fact that the realm of cyberspace is likely to be the theatre of future conflict. MoS (MEA) General V.K. Singh, while Chief of Army Staff, had put together a cyber warfare group, but this seems to have been relegated in importance by his successors.

    Interestingly, in the US, the backbone of that superpower’s cyber capability in both attack and defence is talent from India, either still holding Indian passports or naturalised citizens. They say that military mishaps which may be passed off as accidents may in fact be the consequence of cyber warfare from unknown sources, as there are multiple groups of experienced hackers globally available on hire to the highest bidder. They say that the creation of stronger firewalls against cyber intrusions, including in the corporate and urban infrastructure sphere, needs to become a top priority of the Modi government as it crosses its first 1,000 days of existence

    idrw.org . Read more at India No 1 Defence News Website http://idrw.org/sukhoi-likely-downed-by-cyber-weapons/ .
    P.S I am 99.9999% sure china might have something to do with it:computer1:
     
    Last edited: May 28, 2017
    Wolfpack, Levina and SrNair like this.
  2. SrNair

    SrNair Captain FULL MEMBER

    Joined:
    Oct 28, 2016
    Messages:
    1,115
    Likes Received:
    1,350
    Country Flag:
    India
    Its electronic systems are Israeli and Indian .
    I have doubt about it.
     
    Levina likes this.
  3. The BrOkEn HeArT

    The BrOkEn HeArT 2nd Lieutant FULL MEMBER

    Joined:
    Oct 22, 2016
    Messages:
    208
    Likes Received:
    256
    Country Flag:
    India
    This is a serious issue if it is true.
    Cyber security must be first priority when you are flying a computerized machine.
     
    Wolfpack, Levina and SrNair like this.
  4. DrSomnath999

    DrSomnath999 Major RESEARCHER

    Joined:
    Jun 11, 2011
    Messages:
    2,659
    Likes Received:
    1,510
    Country Flag:
    France
    Earliear it was claimed su 30 mki system computer are prone for malfunction,so they need to do something urgently about this orelse!!!!
    It anybody 's guess what would happen next

    CHEERS
     
    Wolfpack, Levina and SrNair like this.
  5. Flyboy!

    Flyboy! Lieutenant FULL MEMBER

    Joined:
    Dec 18, 2014
    Messages:
    775
    Likes Received:
    495
    Country Flag:
    India
    not the first time we have lost a su 30 because of FBW issues. add to that bad weather and mountainous terrain. This is falsified news .
     
    Last edited: May 28, 2017
    Levina likes this.
  6. shaktimaan

    shaktimaan Lieutenant FULL MEMBER

    Joined:
    Nov 1, 2016
    Messages:
    557
    Likes Received:
    502
    Country Flag:
    India
    source is Sunday guardians live, might be they want to increase differences between India and China
     
    Levina likes this.
  7. DrSomnath999

    DrSomnath999 Major RESEARCHER

    Joined:
    Jun 11, 2011
    Messages:
    2,659
    Likes Received:
    1,510
    Country Flag:
    France
    I dont think so but yes till thorough investigation are nt carried out ,we cant confirm anything but yes the issue is critical ,this thing which the article claim it can also happen

    CHEERS
     
  8. PeegooFeng41

    PeegooFeng41 2nd Lieutant FULL MEMBER

    Joined:
    Feb 8, 2017
    Messages:
    307
    Likes Received:
    433
    Country Flag:
    India
    I guess one needs to be careful about differentiating between Electronic and cyber weapons.

    Electronic measures and counter measures are known for quite sometime and identifying them is a established procedure in any military and/or airfare.

    Cyber is a different game altogether. It involves software and software vulnerabilities. But to bring down a plane, a cyber attack will need to interfere with FBW of it or something similar. These computers/processors tend to be isolated and redundant. I do not know on what points are these analysts are suggesting cyber attacks.

    I can see a totally different angle to this analysis though. Usually in any platforms like Su-30 etc, the easiest way to make money is to add more software. It expands features and its pricey but does not add any weight to the platform and hence requires mostly not major rework of the airframe in itself. I guess someone in US wants to sell some software based solution to IAF and using this incidence (I do not know if it is accident or an attack) to grind their axe. Remember in F-35 perhaps one of the most expensive part as a whole is huge software components written for it.

    It may not be a component even, it could be a service to pen-test the avionics charged at a insanely high rate.
     
    Levina, Bloom 17 and Blackjay like this.
  9. vstol jockey

    vstol jockey Colonel MILITARY STRATEGIST

    Joined:
    Mar 15, 2011
    Messages:
    13,481
    Likes Received:
    14,909
    Country Flag:
    India
    When I declared that LSA will have Power by wire controls and no FBW, few members raised many questions about it and I had at that time stated that FBW is prone to cyber attacks. seems my predictions are coming true.
     
    Wolfpack and Levina like this.
  10. PeegooFeng41

    PeegooFeng41 2nd Lieutant FULL MEMBER

    Joined:
    Feb 8, 2017
    Messages:
    307
    Likes Received:
    433
    Country Flag:
    India
    Thats interesting. I always wondered how come a closed and isolated computer system like processors running flight control laws can be attacked via software. I know a number of systems running quite crappy code but it is impossible to attack them because of isolation. It is called 'Attack Surface Area' if I remember correctly.

    There may be huge software vulnerabilities in say one's digital camera software but unless there is a way to interact with the CPU running the camera firmware, I don't think those vulnerabilities can be exploited to say damage the camera flash. Certainly not remotely to say the least.
     
    Levina and Bloom 17 like this.
  11. Soumya

    Soumya Major STAR MEMBER

    Joined:
    Jun 10, 2013
    Messages:
    3,438
    Likes Received:
    1,814
    People believing this :facepalm:
     
  12. zebra7

    zebra7 Captain FULL MEMBER

    Joined:
    Nov 3, 2016
    Messages:
    1,170
    Likes Received:
    1,191
    Country Flag:
    India

    ????
     
  13. vstol jockey

    vstol jockey Colonel MILITARY STRATEGIST

    Joined:
    Mar 15, 2011
    Messages:
    13,481
    Likes Received:
    14,909
    Country Flag:
    India
    The FBW can be hacked on ground by installing a virus and many people have shown abilities to hack self drive system of cars using the radio fitted in car. Iran brought down a US drone using hacking codes developed by Russians.
     
    Sathya and Levina like this.
  14. zebra7

    zebra7 Captain FULL MEMBER

    Joined:
    Nov 3, 2016
    Messages:
    1,170
    Likes Received:
    1,191
    Country Flag:
    India
    Funny topic.

    He did forget the effect of a lightening strike and surge on the electronics, and jumps to the so called cyber attack.


    Probably he won't be aware of the kind of the computer system, and the Real time embebded OS involved for the FBW and mission computer, and the kind of security it have.
    Probably he won't be aware of the fact, that the running program could only be altered after a reboot, and removal of its copy from its RAM.
    Probably he won't be aware of the fact, that each file have its own unique CRC code, any change would trigger the breach.
     
    Levina and Bloom 17 like this.
  15. nair

    nair Die hard Romeo Staff Member ADMINISTRATOR

    Joined:
    Nov 24, 2014
    Messages:
    1,140
    Likes Received:
    2,252
    Country Flag:
    India
    Internet.....
     
    Levina and Zen0 like this.
Thread Status:
Not open for further replies.

Share This Page