Trending

Cyber Threat Actor Selling Alleged Sensitive Data of Indian Government in Darkweb for 25 BTC

It’s not uncommon for cyber threat actors to breach government agencies and steal their information.

We have seen several instances of that in the past where organised cybercrime groups have targeted these agencies such as below:

However, when certain groups or actors actions might be influenced by geopolitical reasons. Most recently, we noticed one of the leaks related to BEML (an actor with the alias ‘spectre’ has claimed the responsibility of the BEML leak in an email sent to Cyble team). The actor mentioned to Cyble“To put it simply I was the one behind the leak”. The actor further claimed to be an activist and added – “I have leaked other things some of which have been covered in the past by other news sites. I have more sensitive data regarding other governments that I will leak after a certain amount of time so be ready”

On this instance, Cyble was approached by a known actor who is allegedly selling confidential information of the Indian Government for 25 BTC. Cyble researchers investigated this further, and it appears the actor or a third-party managed to gain access scanned copies of sensitive documents.

The actor has shared a “vague” sample as part of our research. The sample appears to be from a scanned or photocopied source (as the actor alleged on his sale).

The actor is selling other India-related documents as well –

report-ad-banner

Cyble has been tracking this actor/group for over 12 months now. Some of the other items in the market by the same actor are below:

The claim by the actor is unconfirmed at this stage, and our researchers are continually searching for more information. The sample Cyble researchers acquired is potentially linked to the leak (as the actor alleged).

If you’ve something to share on this issue, reach out to us at contact@cyble.io.

Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.

Get Threat Assessment Report

Identify External Threats Targeting Your Business​
Free

Threat Landscape Reports 2025

Upcoming Webinars

CISO's Guide to Threat Intelligence 2024

CISO’s Guide to Threat Intelligence 2024: Best Practices

Stay Ahead of Cyber Threats with Expert Insights and Strategies. Download Free E-Book Now

Share the Post:
Scroll to Top

Discover more from Cyble

Subscribe now to keep reading and get access to the full archive.

Continue reading