×

UPSC Courses

DNA banner

DAILY NEWS ANALYSIS

  • 27 February, 2021

  • 8 Min Read

NetWire- Infiltrated Remote Access Trojan

NetWire- Infiltrated Remote Access Trojan

Introduction

  • Activist Rona Wilson, who has been imprisoned since June 2018 in connection with the Bhima Koregaon violence case, filed a petition in the Bombay High Court seeking a stay on proceedings against him and others who are co-accused.
  • His petition referred to a report brought out by Arsenal Consulting, a digital forensics consulting company. The report states that for 22 months, Mr. Wilson’s computer was controlled by an attacker whose goal was to deliver incriminating documents onto his computer, which formed the basis of the case against him.

What was Arsenal Consulting’s analysis based on?

  • Arsenal Consulting says its analysis was based largely on a forensic image obtained from the hard drive within Mr. Wilson’s computer.
    • A forensic image is often described as a bit-by-bit copy of any electronic device that can store memory.
    • Such an image will include even deleted data or data that were inaccessible to the user.
    • It is considered an important part of digital evidence-gathering during investigations.

How was the computer infiltrated?

  • What is being conveyed by the report is that Mr. Wilson’s computer got infiltrated by a malware that enabled his system to be remote-controlled.
  • Over the course of 22 months, it says, the attacker not only created a hidden folder in his system, but also created incriminating documents inside that folder.
  • These, it says, were never opened but ended up being used in the case against him and others.
  • The report says his computer got compromised on June 13, 2016 after a series of “suspicious mails” from “someone using Varavara Rao’s email account”.
  • Mr. Rao is a co-accused in the case. This person is said to have made repeated attempts to get Mr. Wilson to open a document, which he finally did.
  • This was a bait, and it triggered the installation of the NetWire remote access trojan on his computer.
  • The bait was delivered via an RAR file, which usually contains one or many files in a compressed format.
  • The report says while “Mr. Wilson thought he was opening a link to Dropbox” in the email sent to him, he was actually opening a link to “a malicious command and control server”.

What is NetWire?

  • NetWire, which first surfaced in 2012, is a well-known malware.
  • It is also one of the most active ones around.
  • It is a remote access trojan, or RAT, which gives control of the infected system to an attacker.
  • Such malware can log keystrokes and compromise passwords.
  • Malware, according to cybersecurity experts, essentially do two things.
    • One is data exfiltration, which means stealing data. Most anti-virus software are equipped to prevent this.
    • The other involves infiltrating a system, and this has proven to be far more challenging for anti-virus software.
  • NetWire is described as an off-the-shelf malware, while something like Pegasus, which used a bug in WhatsApp to infiltrate users’ phones in 2019, is custom-made and sold to nations.

What is a command and control server?

  • The commands emerging from this server is what the infected system will carry out.

How did Arsenal Consulting figure out that the incriminating documents were never opened on Mr. Wilson’s computer?

  • Arsenal Consulting says it reviewed the NTFS file system, which can be found on any Windows system.
  • This is a system of storing and organising files. It keeps a log of the files — whether they are created, modified, or deleted.
  • Object identifiers are assigned to files when they are either created or first opened. Arsenal Consulting says none of the “top ten documents” have any such identifiers.

Source: TH


Anti-Defection Law in India

The Supreme Court of India recently gave a final three-week deadline to the Telangana Assembly Speaker to decide pending disqualification petitions against defecting MLAs under the Anti-Defection Law. What is the Anti-Defection Law? The Anti-Defection Law was introduced through the 52nd Amendment (1985), which added the Tenth Schedule to the

Rat-Hole Mining

A major disaster unfolded in East Jaintia Hills, Meghalaya, when at least 18 workers died following an explosion in an illegally operating rat-hole coal mine. This incident highlights the continued prevalence of rat-hole mining despite bans imposed by the National Green Tribunal (NGT) and the Supreme Court of India. Rat-hole mining is driven

India’s Aviation Sector

India’s aviation sector has grown rapidly, becoming a major economic success story. However, regulatory oversight has not evolved at the same pace. Data-driven monitoring of fares and market behavior is essential to ensure fair competition, prevent market abuse, and shift from reactive crisis management to proactive regulation. Challen

Federalism in India

Recently, a high-level committee on Union–State relations submitted its first report to the Government of Tamil Nadu. The report examines the distribution of powers and responsibilities between the Union and the States, highlighting ongoing debates regarding the balance between central authority and state autonomy. This discussion is clos

India–UAE Economic Partnership

The relationship between India and the United Arab Emirates has evolved from a traditional energy-based partnership into a comprehensive economic and strategic relationship. Over the years, strong political trust, growing trade, and expanding investments have transformed bilateral ties into a diversified economic corridor. The economic partnership

DNA

22 Mar,2026

Toppers

Search By Date

Newsletter Subscription
SMS Alerts

Important Links

UPSC GS Mains Crash Course - RAW