Pakistani Cyber Jihadi

A Pakistani Inter-Service Intelligence cyber ‘jihadi’ unit was able to honey-trap and blackmail an Indian Air Force Group Captain into revealing classified IAF information. (IANS photo) 

NEW DELHI — It was a group of 300 Inter-Services Intelligence cyber 'jihadis' led by the Rana brothers of Karachi who honey-trapped and blackmailed Group Captain Arun Marwaha to extract Indian defense secrets from the Indian Air Force officer who once trained intelligence officers and naval commandos, police said Feb. 9.

A Delhi Police officer, part of the team investigating the case, told IANS that IAF officer Marwaha – posted at the Air Headquarters in Delhi – was lured by Sajid and Abid Rana and their group members, including some women, who used to chat with Marwaha on social media by posing as sex models.

According to the police officer, Marwaha, 51, shared information and documents with two Pakistani agents who chatted with him on Facebook, pretending to be women. The fake accounts, in the names of 'Kiran Randhawa' and 'Mahima Patel,' were used to lure him.

During sex chats, Marwaha passed on the secret information to the group run by Pakistan's ISI.

The police officer said the Rana brothers had earlier targeted thousands of Indian officers by sending them chat requests through Trojan malware disguised as legitimate software to hack and gain access to the users' systems.

Users are typically tricked by some form of social engineering into loading and executing the malware on their systems.

A similar application was also used by Pakistani terrorists to access Indian troop movement before and after the terror attack on the IAF base in Pathankot in January 2016, the officer said.

"Rana brothers used this application, which is basically a data-stealing software, to take control of the user's phone," he said.

The Karachi-based cyber unit observes the internet habits of Indian defense officials by tracking their social media activities.

"The officers using smartphones of Chinese origin are particularly under their radar. Those visiting porn sites or befriending women using various social media and clicking on links on these sites are being monitored closely," he said.

The police officer said many other hacking software programs are used by the members of this cyber unit. Some of the commonly used programs are Free Proxy, Squid, Java Anon Proxy, Shadowsoc, Tiny Proxy, Nginx, Stunnel, Internet Junkbuster, Proxomitron, Safe Squid, Ghost Proxy, Steady Proxy and others.

These software programs help hackers dodge the investigation agency by re-routing their IP addresses, making the origin of a cybercrime almost untraceable.

The group captain was first detained by the IAF on Jan. 31 after his activities were found to be "suspicious."

The Air Force later approached the Delhi Police to investigate. 

He allegedly used his smartphone to click pictures of classified documents pertaining to the IAF headquarters and then sent them via WhatsApp.

According to a Special Cell officer, the defense officer befriended the ISI agents posing as women models and chatted with them regularly on WhatsApp, exchanging intimate messages.

The ISI agents also blackmailed him after he sent them his nude pictures and videos, the officer said.

"The documents which Marwaha shared mostly dealt with training and combat-related air exercises. We also found he shared documents of the exercise 'Gagan Shakti,'" the officer added.

The IAF officer has a good track record so far and has trained officers of the Marine Commandos (Marcos) of the Navy and the intelligence wing of the IAF.

(0) comments

Welcome to the discussion.

Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language.
PLEASE TURN OFF YOUR CAPS LOCK.
Don't Threaten. Threats of harming another person will not be tolerated.
Be Truthful. Don't knowingly lie about anyone or anything.
Be Nice. No racism, sexism or any sort of -ism that is degrading to another person.
Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts.
Share with Us. We'd love to hear eyewitness accounts, the history behind an article.