Appin was an Indian cyber espionage company that provided hacking services to governments, private investigators, and corporate clients. Founded in 2003 by Rajat Khare and high school friends, Appin began as a technology education startup, offering franchised courses in programming, robotics, and cybersecurity to Indian university students. By 2007, it had launched a digital security consultancy whose work for Indian intelligence and military agencies drew the company into government surveillance operations, and by 2010 it had shifted to mercenary hacking for private-sector clients. It operated a digital platform through which 70 clients commissioned hacks against hundreds of targets worldwide.[1]
According to investigative reports by Reuters, Appin was a "hack-for-hire powerhouse that stole secrets from executives, politicians, military officials and wealthy elites around the globe."[1] The company is credited with creating the operational model still used by India's cyber-mercenary industry.[2][3][4] Khare, through his U.S. law firm Clare Locke, has denied any involvement in hacking, stating he "has never operated or supported, and certainly did not create, any illegal 'hack for hire' industry" and that under his tenure Appin specialised in training students in cybersecurity, "never in illicit hacking."[1] His lawyers have described media reports tying Khare to hacking as "false" or "fundamentally flawed" and have said he left Appin in part because rogue actors were misusing the company's brand.[1]
Between 2012 and 2016, Appin became the subject of criminal investigations in several countries, though these were eventually closed without charges.[1] Google's threat intelligence team tracked hackers linked to Appin targeting tens of thousands of email accounts.[5][1] Following increased scrutiny, Appin scaled back its online presence and was subsequently renamed multiple times, ultimately becoming Sunkissed Organic Farms in 2017, while former employees went on to found other hack-for-hire firms that continue to operate.[3][1]
Co-founder Rajat Khare, who resides in Switzerland, has been the subject of ongoing legal actions and media investigations. According to a report by Reporters Without Borders, Khare and entities associated with Appin have targeted at least 15 media outlets with lawsuits and legal demands in multiple countries, which RSF described as "an offensive on an unprecedented global scale" to suppress reporting on the company's activities.[6]
History
Founding and government work
In December 2003, Rajat Khare, along with high school friends, conceived Appin to offer technology training workshops to university students. By 2005, Rajat Khare had been joined by his brother Anuj Khare, a former motivational speaker, and the company had an office in western New Delhi. Their franchise offered courses in programming, robotics, and cybersecurity. By 2007, Appin had opened a digital security consultancy helping Indian organisations defend themselves online. This drew the attention of Indian government officials, who were navigating internet-era intelligence challenges and seeking ways to hack into computers and emails.[1]
Shortly thereafter, Appin established a subsidiary called Appin Software Security, also known as the Appin Security Group, to conduct surveillance activities for the Indian government. Employees signed non-disclosure agreements and were assigned to military-controlled facilities, where they worked away from their colleagues in the wider company. Their targets included Pakistan, China, and Khalistan movement separatists from India's Punjab state.[1][7]
By 2009, the company's clients had included the Research and Analysis Wing (RAW), the Intelligence Bureau, India's military, the Ministry of Home Affairs, and the Central Bureau of Investigation (CBI).[1][4] Appin claimed its solutions were used by government intelligence agencies to monitor hostile individuals, marketed software for analysing call metadata, and explored importing Israeli cell phone interception devices. For the fiscal year ending in 2009, the company earned nearly $1 million in revenue and a profit of about $170,000, with projections of a nearly tenfold revenue increase over the following 36 months.[1]
The company also generated additional revenue by covertly reselling material it had hacked for one Indian agency to another.[1] This practice was eventually uncovered, prompting several Indian intelligence agencies to terminate their contracts with Appin. According to Reuters, following the loss of government contracts, Appin shifted its focus to private sector clients.[1]
Private sector operations
According to a 2023 New Yorker report citing Geneva investigator Jonas Rey, Khare approached private intelligence firms across Europe around 2010 offering hacking services, and an Appin presentation from that period advertised the company's hacking capabilities.[4][1] Khare's lawyers at Clare Locke have said he had never seen the 2010 presentation and that "the document is a forgery or was doctored."[1] Around 2011, Appin began operating a digital dashboard dubbed "My Commando" for spy services, resembling an e-commerce platform with a menu of hacking options. Customers logged in to request Appin to hack emails, computers, or phones, monitor the operation's progress, and later download the stolen data.[1][7] Seventy global clients hired Appin to hack hundreds of targets through "My Commando."[1][4]
Among the system's early users were Israeli private detectives Aviram Halevi and Tamir Mor, who accessed it in 2011. That year, Mor ordered hacks on more than 40 targets, including Malaysian politician Mohamed Azmin Ali, Russian oligarch Boris Berezovsky, and members of Berezovsky's legal team.[1] Around the same time, another user hired Appin to hack 30 targets, including a Rwandan dissident and the wife of another wealthy Russian going through a divorce.[1]
The targets also included Kristi Rogers—the wife of Representative Mike Rogers, who was the Chairman of the U.S. House Intelligence Committee at the time.[1][4]
Other individuals, such as a landscape architect in New Jersey and a Native American tribal member, were also targeted using the system.[1] Appin also targeted a human rights activist associated with the Oslo Freedom Forum, along with governmental and private organisations.[1][3][7]
In January 2012, a series of targeted emails containing malicious attachments were sent to Peter Hargitay, a Zurich-based FIFA insider and former adviser to FIFA President Sepp Blatter, who had been consulting for Australia's 2022 FIFA World Cup bid.[8][1] Hargitay and his son Stevie detected the intrusion, and an expert they hired traced the attack to a server near Zurich airport whose billing records listed Khare as the client.[1] The Hargitays filed a criminal complaint with Swiss authorities.[1][8]
According to a 2022 investigation by SRF Investigativ, the attack was part of an extensive espionage campaign in which Qatar sought to protect its 2022 World Cup hosting rights by hacking the emails and phones of FIFA officials and critics of its bid, and running smear campaigns to influence FIFA policy.[8][9] Qatar had hired Global Risk Advisors, a firm founded by former CIA operative Kevin Chalker, which frequently used subcontractors; the Hargitay hack was subsequently traced to Appin.[8][10][11] The broader campaign, dubbed "Project Merciless," spanned five continents over several years.[8][10] Hack-for-hire companies founded by Appin alumni were also later implicated in the campaign.[9]
Also in 2012, a German private investigator paid Appin $3,000 to hack an email during an inheritance feud involving a wealthy businessman.[2] In the Dominican Republic, authorities raided a local newspaper publisher in 2012 and formally accused him of collaborating with Khare to hack emails and extract information from the nation's elite for his digital newspaper. The publisher later admitted that in 2011, he paid Appin between $5,000 and $10,000 a month to spy on over 200 prominent Dominicans including Leonel Fernández, then president of the Dominican Republic.[1]
Investigations and attribution
In 2012, after analysing a hack and leak targeting a Native American tribal member, the FBI linked multiple cases to a single perpetrator. Collaborating with Swiss authorities, the FBI identified the perpetrator as Appin and shared that they had human intelligence through a confidential source.[1]
In early 2013, Norwegian telecommunications company Telenor discovered that hackers had stolen as many as 66,000 emails from its chief executive, two personal assistants, and a senior lawyer in what the company described as industrial espionage; Norwegian police traced the attack to IP addresses in New Delhi.[1] Appin's operations began attracting attention worldwide.[8] By 2013, they had become well known among security researchers. Researchers referred to the group using various monikers, including Operation Hangover by Shadowserver Foundation and Norman Shark,[12][13][14] Monsoon by Forcepoint,[15] and Viceroy Tiger by CrowdStrike.[16][17][18] These reports documented campaigns in which targeted emails containing malicious attachments with exploit-laden documents were used to deploy custom malware (keyloggers, document uploaders, and credential-harvesting tools) across more than 600 command-and-control domains, using only previously known exploits rather than zero-days.[13][18]
In 2023, SentinelOne's analysis of internal Appin records concluded that the company owned and controlled the attack infrastructure and had developed malware in-house, including a keylogger deployed against Pakistani government targets in 2009. Appin also procured exploits from freelancers and commercial vendors.[7]
From 2013 onward, Google spent a decade monitoring hackers linked to Appin who targeted tens of thousands of email accounts on its platform.[5][1] Due to the unusually high volume of activity by the hackers, Google expanded its systems and procedures to keep up with them.[1] Security researchers avoided publicly naming Appin due to legal concerns, though they privately confirmed the link to Reuters.[1] In 2013, an Appin representative told the Wall Street Journal that the company "denies it had any role in any of the attacks" and said that someone, possibly a former employee, had been using its name.[19] The representative separately called the Norman Shark report "a marketing gimmick" and said Appin was "in no manner connected or involved with the activities" described in it.[20]
Since 2012, Appin and its co-founder Rajat Khare have been the subject of criminal investigations in multiple countries. Swiss authorities linked Appin and Khare to a criminal complaint filed by the Hargitays for intrusion into their systems, while Norwegian investigators connected Appin to the Telenor hack. These multinational investigations were carried out over several years but were eventually closed without charges being filed.[1][8]
In 2016, the woman who had hired a private detective to access the email of her fellow Native American tribal member pleaded guilty in federal court. Later, in mid-2020, that detective confessed in an affidavit that he had hired Appin to carry out the email heist. Similarly, Aviram Halevi, who hired Appin to target at least three dozen people in 2011,[1] admitted to employing them to steal emails from a Korean businessman.[2] In 2021, the State Bank of India filed a criminal complaint with the Central Bureau of Investigation, Appin's former client, accusing Khare and others of embezzling ₹8.06 billion ($97 million) from loans to Educomp, where Khare was a director. Khare's lawyers said he had been "cleared" by Educomp's management but did not provide evidence; as of November 2023, Reuters could not determine the status of the case.[1]
Legal campaign against media
Appin and co-founder Rajat Khare have filed lawsuits and sent legal demands to news organisations in multiple countries, including France, Luxembourg, Switzerland, the United Kingdom, and India, seeking removal of references in articles to the company and Khare.[21][22][6] Khare's lawyers at Clare Locke have said the underlying allegations are "categorically false" and "have been rejected by courts and regulatory bodies and debunked by experts," and that Khare's career has been dedicated to "cyber-defense and the prevention of illicit hacking."
In November 2022, a lower court in Geneva ordered SRF Investigativ to provisionally remove Khare's name and photo from its investigative report on the Project Merciless espionage operation. When contacted by RSF, Khare's Swiss lawyer, Nicolas Capt, stated that Khare has taken "legitimate legal action — civil and criminal — to protect his honour, which has been damaged by false accusations."[6]
In June 2023, The New Yorker published an investigation on India's hacking-for-hire industry, detailing the operations of firms founded by Appin alumni, such as BellTroX Infotech Services and CyberRoot Risk Advisory. The Association of Appin Training Centers (AOATC) first sued the U.S. magazine in India, and later, Khare filed a lawsuit against it in Switzerland. A spokesperson for The New Yorker told RSF that the magazine "fully stands behind the piece, which is an accurate and fair account on a matter of legitimate public interest" and would "continue to defend the right to publish important reporting without fear or favor."[4][6]
On 16 November 2023, Reuters published an article about the company and its co-founder Khare titled, "How an Indian Startup Hacked the World." The investigation found that Appin "grew from an educational startup to a hack-for-hire powerhouse that stole secrets from executives, politicians, military officials and wealthy elites around the globe." The report was based on Appin's activities for nearly two decades, including company records, law enforcement files, and input from former employees, clients, and security professionals. The raw material spanning 2005 to 2023 was authenticated by Reuters and further verified by U.S. cybersecurity firm SentinelOne.[1][6]
The AOATC sued Reuters, claiming the news agency had engaged in a "defamatory campaign"[23][24] and accusing the agency of "defamation, mental harassment, stalking, sexual misconduct and trauma" based on what the complaint characterised as unsolicited messages Reuters reporters sent to Appin Training Centers' employees and students. It obtained an injunction from a Delhi court and, on 4 December 2023, Reuters temporarily removed its article. Reuters said that it stood by its reporting.[25][24][26]
An archived version of the Reuters article hosted on the Wayback Machine was likewise removed following demands from lawyers representing Khare.[27] Lawyers for the AOATC further sent demands to Meta Platforms, LinkedIn and Naukri.com to block accounts associated with the authors of the Reuters story.[22]
On the same day as the Delhi court injunction, the Indian Ministry of Home Affairs revoked the Overseas Citizenship of India (OCI) card of Raphael Satter, one of the Reuters journalists who reported the story, stating he had been "practising journalism without proper permission" and "maliciously creating adverse and biased opinion against Indian institutions in the international arena".[28] Satter said he had received threats from individuals associated with Appin during his reporting, one of whom alluded to potential "diplomatic action" unless he abandoned his investigation.[28]
In February 2024, Wired reported that lawyers for Appin and a related entity called the "Association for Appin Training Centers" have filed lawsuits and made legal threats against more than a dozen news organisations. Appin sent emails demanding that news site Techdirt and the organisation MuckRock, which hosted some of the information Reuters relied on, take down their content. The two sites denied that the injunction was binding on them.[29][30][31] Other sites, such as the Lawfare blog, removed material based on the Reuters article.[24][29]
The Electronic Frontier Foundation (EFF) responded on behalf of Techdirt and MuckRock, arguing that the Indian court's order is unenforceable in U.S. courts because it conflicts with the First Amendment and Section 230 of the Communications Decency Act, as reinforced by the SPEECH Act. The EFF also argued that recipients of such orders should carefully evaluate their enforceability.[32][30][31]
In February 2024, two episodes of the American podcast Behind the Bastards about Khare were pulled from podcast platforms after the show received a legal threat; the episodes had avoided using Khare's name in their titles.[6]
The Reuters article was restored in October 2024, after the Delhi court rescinded its injunction on 3 October 2024, noting "the plaintiff has not been able to show any prima facie case to make interference in the process of journalism".[33] The article is back online at its original location.[1]
On 21 November 2024, Reporters Without Borders (RSF) reported that works from at least 15 different media outlets had been modified or withdrawn as a result of a strategic lawsuit against public participation or a legal notice from Khare or Appin Training Centers. RSF also found that numerous posts praising Khare appeared on platforms such as Medium, authored by accounts with generic names and AI-generated profile photos that commented on one another's content, in what RSF described as an attempt to "flood the Internet" and "drown out the troublesome investigations". Additionally, an Intelligence Online article[11] was the subject of what RSF described as an "abusive DMCA takedown request".[6][34]
In March 2025, Satter petitioned the Delhi High Court to challenge the OCI revocation.[28] During a November 2025 hearing, the court criticised the Ministry of Home Affairs for its documentation, with the judge stating that MHA officers had "completely distorted" the paperwork supporting the cancellation.[35]
Legacy
Alumni firms
Following Norman Shark's public attribution of the Telenor hack to Appin,[13] the company faced increasing scrutiny, and the group began scaling back its online presence.[1] Around that time, former Appin employees branched out, founding similar hack-for-hire firms.[3] Khare's lawyers have said he cannot be held responsible for the activities of those alumni firms, comparing such attribution to "holding Harvard University responsible for the terrorist bombings carried out by its former student Ted Kaczynski."[1]
Two such companies—BellTroX Infotech Services, led by Sumit Gupta, and CyberRoot Risk Advisory[36]—started collaborating with Appin, sharing staff and computer infrastructure for their hacking operations.[2]
Their activities were identified using a database of over 80,000 phishing emails sent to 13,000 targets from 2013 to 2020.[2] This database was vetted by six expert groups, with each group independently confirming recognised hacking activity.[2] Further analysis by Mandiant, LinkedIn, Google,[5] and court records revealed that the hacking was carried out by three Appin-linked companies with an intermingling of resources among them.[2] This network of mercenaries charged clients anywhere from a few thousand to over a million dollars,[36] while paying workers just $370 per month.[2]
The hackers targeted attorneys and their clients, including companies, advocacy groups, media organisations, and business executives. According to Shane Huntley of Google's threat intelligence team, these attacks had "real potential to undermine the legal process."[2] Reuters linked Appin alumnus Sumit Gupta to Aviram Azari, a former Israeli policeman who was sentenced to 80 months in prison for his role in a global hack-for-hire scheme,[2][37][38] the Dark Basin campaign, and the wider network of Indian hack-for-hire operators.[2][4] In a 2020 interview with Reuters, Gupta denied wrongdoing, acknowledging that he provided technical support to private detectives but stating he was not personally involved in cyber espionage.[36][1] By 2023, attempts to reach him were unsuccessful.[1]
Rebrandings and aftermath
Appin Technology rebranded multiple times before adopting the name Sunkissed Organic Farms in 2017. Its subsidiaries also underwent rebranding. In 2015, Appin Software Security became Adaptive Control Security Global Corporate (ACSG).[1]
Later, Rajat Khare resigned as director of the company (by then renamed from Appin Technology) in 2016 and moved to Switzerland, where, according to SRF Investigativ, "he now presents himself as a renowned start-up investor."[1][8] Together with his wife Shweta, Khare runs Boundary Holding, a Luxembourg-based venture capital firm.[39] His family controls companies founded under the Appin name, as well as the renamed Indian firms, including ACSG, which describes itself as a "critical infrastructure protection company that caters to government clients."[1]
References
- Raphael Satter, Zeba Siddiqui, Chris Bing. How an Indian startup hacked the world Reuters, 2023-11-16, retrieved 2024-12-31^
- Raphael Satter, Christopher Bing. How mercenary hackers sway litigation battles Reuters, 2022-06-30, retrieved 2024-12-31^
- Franz Wild. Inside the global hack-for-hire industry Bureau of Investigative Journalism, 2022-05-11, retrieved 2023-11-20^
- David Kirkpatrick. A Confession Exposes India's Secret Hacking Industry The New Yorker, 2023-06-01, retrieved 2023-11-20^
- Shane Huntley. Countering hack-for-hire groups Google, 2022-07-30, retrieved 2025-01-04^
- RSF investigation: the Indian cyber-security giant silencing media outlets worldwide Reporters Without Borders, 2024-11-21, retrieved 2024-12-31^
- Tom Hegel. Elephant Hunting: Inside an Indian Hack-For-Hire Group SentinelLabs, 2023-11-16^
- Leo Eiholzer, Andreas Schmid. 'Project Merciless': how Qatar spied on the world of football in Switzerland Swiss investigative program Rundschau (swissinfo.ch), 2022-11-02, retrieved 2025-01-04^
- Franz Wild, Ed Siddons, Simon Lock, Jonathan Calvert, George Arbuthnott. How Qatar hacked the World Cup Bureau of Investigative Journalism, 2022-11-05, retrieved 2025-02-06^
- Alan Suderman. World Cup host Qatar used ex-CIA officer to spy on FIFA Associated Press, 2021-11-23, retrieved 2025-01-09^
- Former Indian cyber privateer Rajat Khare is helping Qatar keep the football World Cup safe Intelligence Online, 2022-10-20, retrieved 2024-12-31^
- Snorre Fagerland. The Hangover Report Norman ASA, 2013-05-20, retrieved 2023-12-18^
- Snorre Fagerland, Morten Kråkvik, Jonathan Camp. Operation Hangover: Unveiling an Indian Cyberattack Infrastructure Norman ASA, 2013, retrieved 2023-12-18^
- Operation Hangover: Unveiling an Indian Cyberattack Infrastructure Seebug, part of 360 Netlab, retrieved 2023-12-18^
- Andy Settle, Nicholas Griffin, Abel Toro. Monsoon – Analysis of an Apt Campaign Espionage and Data Loss Under the Cover of Current Affairs Forcepoint, retrieved 2025-01-01^
- Doel Santos, Alex Hinchliffe. Threat Assessment: Hangover Threat Group Palo Alto Networks, 2020-07-03, retrieved 2025-01-01^
- Alex Hinchliffe, Robert Falcone. Updated BackConfig Malware Targeting Government and Military Organizations in South Asia Palo Alto Networks, 2020-05-11, retrieved 2025-01-01^
- Jean-Ian Boutin. Targeted information stealing attacks in South Asia use email, signed binaries WeLiveSecurity, 2013-05-16, retrieved 2025-01-03^
- Jennifer Valentino-DeVries. Cyberespionage Campaign Traced to India The Wall Street Journal, 2013-05-20, retrieved 2025-01-04^
- Kelly Jackson Higgins. 'Commercialized' Cyberespionage Attacks Out Of India Targeting U.S., Pakistan, China, And Others Dark Reading, 2013-05-20, retrieved 2025-01-04^
- Mathew Ingram. A leak-hosting site looks to thaw the chill of censorship Columbia Journalism Review, 2024-01-18, retrieved 2024-02-12^
- Global censorship campaign raises alarms Freedom of the Press, 2024-01-18, retrieved 2024-02-12^
- Rashid Omar. Forced to Pull Story on Indian Firm's Alleged Global Hacking Operation, Reuters to Fight Court Order The Wire, 2023-12-07^
- Tom Uren. The Hack-for-Hire Industry: Death by a Thousand Cuts + When Theft Doesn't Work... Troll Lawfare, 2023-11-24, retrieved 2024-02-10^
- Mike Masnick. Indian Court Orders Reuters To Take Down Investigative Report Regarding A 'Hack-For-Hire' Company Techdirt, 2023-12-07^
- Joseph Cox. Reuters Takes Down Blockbuster Hacker-for-Hire Investigation After Indian Court Order 404 Media, 2023-12-06, retrieved 2023-12-18^
- Michael Schaffer. How a Judge in India Prevented Americans From Seeing a Blockbuster Report POLITICO, 2024-01-19, retrieved 2024-02-12^
- OCI Card Cancelled After Report on Indian Firm's Mercenary Hacking, Journalist Goes to Court The Wire, 2025-03-15, retrieved 2026-03-09^
- Mike Masnick. Sorry Appin, We're Not Taking Down Our Article About Your Attempts To Silence Reporters Techdirt, 2024-02-01, retrieved 2024-02-10^
- Andy Greenberg. A Startup Allegedly Hacked the World. Then Came the Censorship—and Now the Backlash Wired, 2024-02-01^
- The Association of Appin Training Centers is waging a global censorship campaign to stop you from reading these documents MuckRock, 2024-02-01, retrieved 2024-02-10^
- Cooper Quintin, Eva Galperin. EFF Helps News Organizations Push Back Against Legal Bullying from Cyber Mercenary Group Electronic Frontier Foundation, 2024-02-08, retrieved 2024-12-30^
- Reuters exposé of hack-for-hire world is back online after Indian court ruling Reuters, 2024-10-26, retrieved 2024-12-19^
- La réputation d'un "roi de la tech" indien au cœur d'un curieux bras de fer Gotham City, 2022-12-07, retrieved 2024-12-31^
- HC raps MHA for 'distorted' paperwork in Reuters journalist's OCI case Newslaundry, 2025-11-27, retrieved 2026-03-09^
- Raphael Satter, Christopher Bing. SPECIAL REPORT-His emails were stolen; now he's exposing the hack-and-leak industry Reuters, 2022-06-30, retrieved 2025-01-29^
- James Reddick. Israeli private eye gets 80-month sentence for global hack-for-hire scheme The Record, 2023-11-17, retrieved 2025-01-12^
- India, Israel, United States BellTrox affair scares corporate intelligence world Intelligence Online, 2020-06-24, retrieved 2025-01-27^
- Faizan Haidar. Boundary Holding's top executives buy land in Delhi for Rs 76 crore The Economic Times, 2023-09-05, retrieved 2025-01-10^