Close this search box.

Chinese Hackers Target Indian Power Grid Amid Political Tensions


In the midst of heightened border tensions between India and China, researchers have uncovered a concerted campaign against India’s critical infrastructure, including the nation’s power grid, from Chinese state-sponsored groups.

The attacks coincided with the standoff between the two nations in May 2020 and targeted a total of 12 organisations, 10 of which are in the power generation and transmission sector.

The report (by Recorded Future) noted:

10 distinct Indian power sector organisations, including four of the five Regional Load Despatch Centres (RLDC) responsible for operation of the power grid through balancing electricity supply and demand, have been identified as targets in a concerted campaign against India’s critical infrastructure…Other targets identified included 2 Indian seaports.

China-linked Group RedEcho Targets the Indian Power Sector Amid Heightened Border Tensions by Recorded Future

Chief among the victims include a power plant run by National Thermal Power Corporation (NTPC) Limited and New Delhi-based Power System Operation Corporation Limited.

Pinning the intrusions on a new group dubbed “RedEcho,” investigators said the malware deployed by the threat actor shares strong infrastructure and victimology overlaps with other Chinese groups APT41 (aka Barium, Winnti, or Wicked Panda) and Tonto Team.

Border conflicts have flared up since last year after deadly clashes between Indian and Chinese soldiers in Ladakh’s Galwan Valley. While 20 Indian soldiers were killed in the clashes, China formally identified four casualties on its side for the first time on February 19.

India China Cyberwar
A map identifying Indian assets which were the subject of the uncovered attacks

In the intervening months, the Indian government banned over 200 Chinese apps for allegedly engaging in activities that posed threats to “national security and defence of India, which ultimately impinges upon the sovereignty and integrity of India.”

Noting that the standoff between the two countries was accompanied by increased espionage activity on both sides.

Additionally, the report also raises questions about a possible connection between the skirmishes and a power blackout that crippled Mumbai last October.

While initial probe conducted by the cyber department of the western Indian state of Maharashtra traced the attack to a piece of unspecified malware identified at a Padgha-based State Load Despatch Centre, the researchers said, “the alleged link between the outage and the discovery of the unspecified malware variant remains unsubstantiated.”

“However, this disclosure provides additional evidence suggesting the coordinated targeting of Indian Load Despatch Centres,” they added.

Interestingly, these cyberattacks were described as originating from Chengdu, which is also the base for a network technology firm called Chengdu 404 Network Technology Company that operated as a front for a decade-long hacking spree targeting more than 100 high-tech and online gaming companies.

But it’s not just China.

In the weeks leading to the clashes in May, a state-sponsored group called Sidewinder — which operates in support of Indian political interests — is said to have singled out Chinese military and government entities in a spear-phishing attack using lures related to COVID-19 or the territorial disputes between Nepal, Pakistan, India, and China.

The modus operandi aside, the finding is yet another reminder of how critical infrastructure continues to be a lucrative target for an adversary looking to cut off access to essential services used by millions of people.

Ahmed Khanji

Ahmed Khanji

Ahmed Khanji is the CEO of Gridware, a leading cybersecurity consultancy based in Sydney, Australia. An emerging thought leader in cybersecurity, Ahmed is an Adjunct Professor at Western Sydney University and regularly contributes to cybersecurity conversations in Australia. As well as his extensive background as a security advisor to large Australian Enterprises, he is a regular keynote speaker and guest lecturer on offensive cybersecurity topics and blockchain.


Sydney Offices
Level 12, Suite 6
189 Kent Street
Sydney NSW 2000
1300 211 235

Melbourne Offices
Level 13, 114 William Street
Melbourne, VIC 3000
1300 211 235

Perth Offices
Level 32, 152 St Georges Terrace
Perth WA 6000
1300 211 235


Learn more about the team at the forefront of the Australian Cyber Security scene.

About Us →

Meet the Team →

Partnerships →

Learn more about the team at the forefront of the Australian Cyber Security scene.

Career Opportunities →

Internships →

Media appearances and contributions by Gridware and our staff.

See More →



Whether you need us to take care of security for you, respond to incidents, or provide consulting advice, we help you stay protected.

View all services →

Web App Pen. Test Calculator →

Network Pen. Test Calculator →

Governance & Audit

Legal and regulatory protection

Penetration Testing

Uncover system vulnerabilities

Remote Working & Phishing

Fortify your defenses

Cyber Security Strategy

Adaptation to evolving threats

Cloud & Infrastructure

Secure cloud computing solutions

Gridware 360

End-to-end security suite

Gridware Managed Services

Comprehensive & proactive security

Gridware CloudControl

Harness the benefits of cloud technology

Gridware Incident Response 24/7

Swift, expert-led incident resolution



A collection of our published insights, whitepapers, customer success stories and more.

Customer success stories from real Gridware customers. Find out how we have helped others stay on top of their Cyber Security.

Read More →