24 x 7 World News

Father Stan SwamyтАЩs computer was hacked with malware over six years, finds U.S. based digital forensic firm

0
File photo of Stan Swamy.

File photo of Stan Swamy.
| Photo Credit: PTI

Late Father Stan SwamyтАЩs computer was compromised by the same attacker who hacked the computers of co-accused Rona Wilson and Surendra Gadling in the Bhima Koregaon caste violence case, U.S.-based┬аdigital forensics┬аfirm,┬аArsenal Consultancy, has found.

Fr. Swamy, 82,┬аa Jesuit priest and tribal rights activist, was arrested by the National Investigation Agency┬а(NIA) from his home in Ranchi┬аon October 8, 2020.┬аWhile in judicial custody, he died at a private hospital when being treated for COVID-19, on July 5, 2021. The Chelsea-based company was engaged by Fr. SwamyтАЩs defence team to analyse electronic evidence seized from his home by the Pune Police on June 12, 2019. On┬аFebruary 10, 2021,┬аthe same consultancy had┬аfound that a hacker controlled┬аMr. WilsonтАЩs┬аcomputer for a period of 22 months to plant documents, which led to an investigation that supposedly unravelled a Communist Party of India (Maoist) conspiracy to eliminate Prime Minister┬аNarendra┬аModi тАЬin another┬аRajiv┬аGandhi type incidentтАЭ.

According to the report released on December 11, 2022, Arsenal ConsultancyтАЩs analysis┬аshowed that Fr Stanislaus LourduswamyтАЩs computer was compromised┬аfrom┬аOctober 19, 2014┬аtill his computer was┬аseized┬аby Pune police on June 12, 2019. тАЬThe attacker responsible for compromising Fr. SwamyтАЩs computer had extensive resources (including time) and it is obvious that their primary goals were surveillance and incriminating document delivery,тАЭ┬аthe report points out.

The┬аforensic investigation┬аhas connected that the same attacker hacked the computer of Mr. Wilson, Mr. Gadling and Fr. StanтАЩs computers by using significant malware infrastructure which was deployed over the course of over six years.┬а Today News 24┬аhas a copy of the report that discloses, тАЬFr. SwamyтАЩs computer was first compromised by the attacker on October 19, 2014 when he opened a document weaponized with NetWire.тАЭ

NetWire is a popular multi-platform Remote Access Trojan (RAT) system. Its features include uploading and downloading files, remote shells, keylogging, proxy chaining (making the identification of attackers more difficult), тАЬstealthтАЭ screenshots, and password тАЬrecoveryтАЭ. The NetWire found that Fr. SwamyтАЩs execution was identical to the embedded documents emailed to Mr. Wilson on November 16 and 28, 2014.

Arsenal found and decrypted NetWire logs from Fr. SwamyтАЩs computer which covered 383 days between July 21, 2015 and June 11, 2019. NetWire logs are 12 files used for surveillance purposes and contain keystrokes and other information related to the victim. The activity captured in these logs included Fr. Swamy browsing websites, submitting passwords, composing emails, and editing documents.

The 25-page report mentions, тАЬIn the Bhima Koregaon case, the attacker used C2 servers – which is a computer system (often virtual) used by an attacker to send and receive data to and from compromised electronic devices. This was used to control malware (e.g. the DarkComet and NetWire RATs), to receive files for surveillance purposes, and to host incriminating files for deployment to victims. The attackerтАЩs surveillance of Fr. SwamyтАЩs removable storage devices and the secondary volume of his computer was quite extensive, involving at least 13 removable storage devices (thumb drives and external hard drives) and over 24,000 files and folders.тАЭ

тАЬArsenal located the incriminating documents on FrтАЩs computer, as they were delivered using the same 14 methodologies used by the attacker to deliver incriminating documents to Mr. Wilson and Mr. GadlingтАЩs computers,тАЭ the report reads.

Leave a Reply