Cyber Espionage Against Critical Infrastructure: A Case Study of Targeted Attacks on Indian State Load Dispatch Centres (SLDCs)
Riya Malpani1
Computer Science & Engineering (First Year)
Jawaharlal Nehru Engineering College, MGM University Chh. Sambhajinagar,India
Email- riyamalpani56@gmail.com
Aneesh Pande2
Computer Science & Engineering (First Year)
Jawaharlal Nehru Engineering College, MGM University, Chh. Sambhajinagar,India
Email- pandeaneesh0304@gmail.com
Ms.Sushama Deshmukh3
Asst.Professor Computer Science & Engineering
Jawaharlal Nehru Engineering College, MGM University, Chh. Sambhajinagar, India
Email-sushamadeshmukh2020@gmail.com
Abstract—With rapid digitalization, India has witnessed an exponential rise in cybercrime, necessitating robust cyber security measures and advanced cyber forensic techniques. While cybersecurity seeks to prevent attacks, Cyber forensics, also known as digital forensics, is a critical discipline within the broader field of cybersecurity that involves the identification, preservation, analysis, and presentation of digital evidence. As cybercrimes continue to evolve in complexity and scale, cyber forensics plays a vital role in investigating incidents such as data breaches, cyber terrorism, and financial fraud.Also, India’s critical infrastructure is facing an unprecedented rise in cyber threats, with electrical grid systems being a prime target.This paper explores the interplay between cyber security and cyber forensics in India through a case study approach of real-life case investigating a targeted cyber espionage campaign against at least seven State Load Dispatch Centres (SLDCs), responsible for grid control via Supervisory Control and Data Acquisition (SCADA) systems, highlighting systemic strengths and weaknesses and assessing the legal and technological responses to cybercrime.
Keywords—Cybersecurity & Cyber forensics, Digital evidence, SCADA systems,Critical infrastructure attacks, Cyber espionage campaign, PLA-linked threat actors, Data breaches, Indian power grid cybersecurity, Forensic analysis, Cyber laws and policy response.