Top

Naik Subedar Patan Kumar Poddar helped Pakistani spy hack into Army PCs

Pakistani woman Spy had hacked the official computers of 151 MC/MF detachment
Hyderabad:The Pakistani woman spy, who had elicited crucial information from Naik Subedar Patan Kumar Poddar, had introduced herself as Anushka Agarwal. She had hacked the official computers of 151 MC/MF detachment, Secunderabad, with the help of Poddar by installing a “Trojan Horse” virus.
This way the spy had accessed details of several regiments’ movements from Secunderabad to different parts of the country including Jodhpur. “She sent me a link and asked me to install it in our official computer, which I did. Later I came to know that it was ‘Trojan’ for remote access of our computer,” confessed the Army man to the Hyderabad police.
She had also sought photographs of the missile unit, storage unit, and their formation signs in Secunderabad. Poddar had clicked photographs of several classified documents and forwarded them to her via email.
“She was seeking information about the movement of Army units, mainly in the Western border of the country. I alerted her whenever any unit was about to move from Secunderabad. I gave her information about movements of 96 field regiments and 10 medium regiments from Secunderabad to Jodhpur and details of their exercise,” confessed the Army man.
“She sent me a list of units deployed in the Western borders and asked me to corroborate the same,” he added. The woman had initially collected the entire profile of Poddar. She had sent him an online form to fill and send back to her. “I filled my personal details and profession profile. I sent it back to her attaching my coloured photo as directed by her,” revealed Naik Subedar Poddar.
The Pak spy had also trained him to sent the information via email using proxy sites to avoid detection. “She taught me how to use proxy sites and send emails. As she asked, I created a separate email ID and shared the password with her so that she could also access the emails. She also asked me to open a separate bank account for monetary transactions,” he said, adding that he would delete each email soon after he sent it to her to avoid detection.
( Source : dc correspondent )
Next Story