Italian defence firms hit by suspected Indian state-backed hackers

Researchers uncover an Indian hacking group’s attacks on Italy’s defence sector, using phishing and malware to infiltrate networks.

apt, cyber-espionage, indian hacking group, italian defence sector state-sponsored hacking, phishing attacks, malware infiltration, operation tainted love, geopolitical cyber threats, data exfiltration, military intelligence, supply chain attacks zero-day exploits, cyber warfare, national security risks, cyber defence stealth operations, apt attribution, international cyber conflict, critical infrastructure targeting

An advanced persistent threat (APT) group with suspected ties to India has been accused of targeting Italian defence companies in a cyber-espionage campaign.

Security researchers found that the hackers used phishing emails and malicious documents to infiltrate networks, stealing sensitive data.

The attacks, believed to be state-sponsored, align with growing concerns about nation state cyber operations targeting critical industries.

The campaign, dubbed ‘Operation Tainted Love,’ involved sophisticated malware designed to evade detection while exfiltrating confidential documents.

Analysts suggest the group’s motives may include gathering intelligence on military technology and geopolitical strategies. Italy has not yet issued an official response, but the breach underscores the escalating risks to national security posed by cyber-espionage.

This incident follows a broader trend of state-backed hacking groups increasingly focusing on the defence and aerospace sectors.

Cybersecurity experts urge organisations to strengthen defences, particularly against phishing and supply chain attacks. As geopolitical tensions influence cyberwarfare, such operations highlight the need for international cooperation in combating digital threats.

Would you like to learn more about AI, tech and digital diplomacy? If so, ask our Diplo chatbot!