NON-STATE THREAT ACTORS
Hacktivist groups, commercial cybercriminals, terrorist digital cells, and insider threats operating within and against India's digital ecosystem. From state-adjacent patriotic hacktivists to Jamtara-style UPI fraud, the non-state threat landscape represents a complex, vertically-integrated industry generating billions in illicit proceeds annually.
Oldest organized Indian hacktivist group. Timing correlation with diplomatic events suggests state coordination. Infrastructure exceeds volunteer funding.
Documented targeting of Indian Army families. WhatsApp channels used by JeM operatives. Infrastructure overlap with APT36 (Transparent Tribe).
Pro-Palestinian group with documented Pakistani alignment. CERT-IN attribution to SideCopy/APT36 TTPs. Hospital infrastructure reconnaissance.
Brand appropriation, not organization. No accountability or membership. Operations driven by protest events. Low technical sophistication.
Punjab utility company data breach exposed name, address, photo for 815M Aadhaar holders. No biometric data acknowledged compromised, but demographic data alone enables synthetic identity fraud.
Attackers gain foothold through phishing, vulnerability exploitation, or compromised credentials.
Privilege escalation and internal network reconnaissance using harvested credentials.
Sensitive data copied before encryption — dual extortion model.
File encryption with military-grade algorithms. Systems rendered inoperable.
Ransom demand issued. Typically 2-5x organization's capacity to pay. Negotiation common.
60% receive functional keys. 40% get partial/corrupt decryption. Total cost = 4-7x ransom.
Romance scams ($672M) and BEC attacks ($300M) primarily target foreign victims — Indian diaspora and international businesses — making recovery nearly impossible through domestic law enforcement.
Indian ransomware variant targeting Windows; propagation via phishing
Python-based ransomware operated by Indian actors; rapid encryption
North Korean Lazarus Group; found in Indian financial institutions
Healthcare, Manufacturing
BFSI, Pharma
Initial Access Brokering
Phishing + commercial spyware against competitor
R&D network compromised, 3 drug formulas stolen
SQL injection during sale period
Fortune 500 clients, telecom insider bribes
Dating apps, social media, wrong-number texts
1-4 weeksStolen photos, fabricated bio, fake credentials
OngoingEmotional building, trust establishment
Weeks-MonthsCrypto platforms, investment opportunities
GradualWithdrawal barriers, partial returns, then ghosting
FinalFake vendor invoices, modified payment details
Impersonate CEO, urgent wire transfer request
Fake lawyer, deal closure urgency
15 major cases, multiple foreign companies victimized
23 foreign companies, USD, UK, Germany, France
₹2.3Cr lost, 5 arrests, bank mule network