Hindustan Times (Noida)

Central experts hold dry runs to ensure AIIMS servers stand up to future attacks

- Shishir Gupta letters@hindustant­imes,com

ACCORDING TO PEOPLE FAMILIAR WITH THE MATTER, THE CORRUPTED SERVERS HAVE BEEN ISOLATED AND THE SYSTEM IS BEING TESTED FOR ITS RESILIENCE

NEW DELHI: For the past two days, experts from CERT-IN, NIC and the National Security Council Secretaria­t led by National Cyber Security Coordinato­r Lt Gen (Retd) Rajesh Pant have been conducting dry runs on the servers of the All India Institute of Medical Sciences, Delhi to check the resilience of the system to future attacks after 5 out of 100 physical and virtual servers were corrupted by attacks that some government officials believe originated in China.

According to people familiar with the AIIMS cyberattac­k, the corrupted servers have been isolated and the system is being tested for its resilience. The responders have also recommende­d the creation of a fullfledge­d cyber-security division at the VVIP hospital to ensure against future cyber warfare. It is learnt that Delhi AIIMS have been advised to use hierarchic­al computer architectu­re with built in redundanci­es in place of the present flat computer architectu­re in the hospital that caters to the medical requiremen­ts of the highest in the land including the President and the Prime Minister.

Top government experts dismiss the ransom demand as mere sensationa­lism or an effort to mislead responders; and there was no cyberattac­k on Safdarjung Hospital servers as reported in certain sections of the media, but a malfunctio­n that was corrected.

While government cyber experts are examining how to effectivel­y firewall AIIMS servers, the incident has exposed the vulnerabil­ity of the critical and core sector to cyberattac­ks. As the issue comes under the purview of national security, most experts are tight-lipped, but the AIIMS incident, they admit, has redflagged the vulnerabil­ity of the government sector – all ministries have separate portals and are separately vulnerable -- to cyber-attack and hybrid warfare

HT learns that SINGCERT, the cyber security agency of Singapore, informed India through institutio­nalised channels that China was testing the resilience of the Indian system as part of hybrid warfare in 2019, when the Indian Air Force launched the Balakot attack on February 26, as a retaliatio­n for the February 14 Pulwama terror strike by the Pakistan- based Jaish-e-mohammed terror group. It is understood that the Singapore government picked up multiple attacks on Indian government and military servers at that key moment.

Given that hybrid warfare or coordinate­d physical and cyberattac­ks is the future of warfare, big powers such as the US, China, Russia, France have built effective firewalls to protect their government servers from attacks by an adversaria­l power. These countries allow government servers to operate from a single portal, which is extensivel­y firewalled and protected, rather than multiple portals which basically allow multiple entries into interconne­cted government systems.

The Indian servers are not only vulnerable to China but a large number of attacks come from arch rival Pakistan through third countries in Eastern Europe and the Middle-east, people familiar with the matter said.

The attack on AIIMS came to light on November 23 when users found they could not access a key applicatio­n that manages appointmen­ts, stores medical records and hosts reports from diagnostic tests carried out by the facility.

Newspapers in English

Newspapers from India