scorecardTCS was hacked for its clients by China’s cyber spy campaign: Report
  1. Home
  2. tech
  3. TCS was hacked for its clients by China’s cyber spy campaign: Report

TCS was hacked for its clients by China’s cyber spy campaign: Report

TCS was hacked for its clients by China’s cyber spy campaign: Report
Tech2 min read
Tata Consultancy Services was reportedly hacked by the Operation Cloud Hopper attributed to the Chinese government    BCCl

  • The Indian IT giant, Tata Consultancy Services (TCS) reportedly has been a victim of ‘Operation Cloud Hopper’, a global cyber espionage campaign attributed to China.
  • An investigative report by Reuters shows how several global IT companies, including TCS, were used to gain access to their client’s networks.
  • China is denying all involvement in the attacks and companies are claiming that no sensitive information was compromised, but the Reuters report shows otherwise.
‘Operation Cloud Hopper’ — a global cyber espionage campaign — first made headlines when Chinese hackers reportedly broke past IBM and Hewlett Packard Enterprise. Now, it seems that they weren’t the only ones attacked.

Other tech companies, including Tata Consultancy Services — an Indian tech giant and one of the biggest IT firms in the world — were also victims of hackers working for China’s Ministry of State Security, according to Reuters. That too, for years.

It isn’t just TCS that was hacked. The service provider was used as a jumping off point to gain access to their client’s networks.

TCS did not respond when contacted for comments.

Denial Mode

Nobody wants to accept that the hack actually happened. The Chinese government denied any involvement. The companies claimed that no sensitive information was compromised, but a Reuters investigation shows otherwise.

In order to hack into a service provider’s server, Operation Cloud Hopper used ‘spear phishing’ emails. This is where emails are sent to the company’s employees in hopes of tricking them into downloading malware or disclosing their passwords.

Normally, that would involve impersonating an employee using the directories of credentials that the hackers had at their disposal, according to Reuters.

Once this phase is successful, hackers start to map out the environment so that they can establish a foothold and make their way towards the real target, the system administrator. The administrator is important because it controls the company’s ‘jump servers’ — a bridge between a service provider and its client’s networks.

After that, it’s just a matter of segregating sensitive information from the jumble of data on the victim’s network. Reuters reports that it wasn’t a random search either, as the hackers knew exactly where to look and find sensitive information.

The commercially sensitive data is copied either directly from the client network or back through the service provider.

Many companies like Hewlett Packard, didn’t even know that they had been hacked for the first couple of years. But once they did find the vulnerability, getting rid of it was a different story altogether. Though were ever able to pick off the hacker footholds one by one, the tricky infiltrators found new ways to come back stronger.

The cycle continued for at least five years, according to Reuters.

‘Operation Cloud Hopper’ and its many attempts to hack into IT companies have mostly been kept under wraps at the behest of the corporate victims. But, the US government, after years of trying to contain the threat finally dubbed the hackers Advanced Persistent Threat 10 (APT10) in December 2018.

See also:
The company that transformed India's passport offices is also working on post offices

Hiring by Indian IT companies has grown 12 months in a row, up over three-fold

TCS is now the world’s third most valued IT service brand