
Nagastra-1R suicide drone: Check the features of this Made-in-India drone
Indian Army
has placed an order for 450
Nagastra-1R loitering munitions
as part of its continued drive to enhance
precision-strike capabilities
and modernize its artillery and infantry support systems. Developed by Nagpur-based
Solar Industries
, the indigenous system represents a significant step toward self-reliance in next-generation tactical weaponry under the 'Make in India' initiative.
480 drones were ordered in 2024
Under the Indian Army's Emergency
Procurement
Powers, an order was placed with Solar Industries' Economic Explosives Ltd (EEL) for 480 Nagastra-1R loitering munitions. Following successful pre-delivery inspections, EEL delivered 120 units to an Army Ammunition Depot. "After successful completion of pre-delivery inspections, EEL delivered 120 Loiter Munitions to an Army Ammunition Depot," defence officials told ANI.
Features of Nagastra-1 'Suicide Drone'
The Nagastra-1 is a
UAV-based loitering munition
designed to act as an aerial ambush system. Its primary function is to hover above targets and execute precision strikes with GPS-enabled accuracy, achieving a remarkable precision of 2 meters.
Precision Strike Capability: In "Kamikaze mode," Nagastra-1 can neutralize hostile threats by directly striking the target and destroying itself in the process.
High Altitude Operation: The drone can fly at altitudes over 4,500 meters, making it difficult to detect by radar.
Surveillance Equipment: It is equipped with day-night surveillance cameras and a warhead capable of defeating soft-skin targets.
Endurance and Range: The fixed-wing electric UAV can operate for 60 minutes, with a man-in-loop control range of 15 kilometers and an autonomous mode range of 30 kilometers.
Recovery Mechanism: The Nagastra-1 has an abort, recover, and reuse feature. If the target is not detected or the mission is aborted, it can be called back and safely landed using a parachute system, making it superior to similar systems developed by advanced countries.
Strategic Advantages
The Nagastra-1 drones are designed for precision strikes on enemy training camps, launch pads, and infiltrators, reducing the risk to soldiers. These man-portable drones are silent due to their electric propulsion and low acoustic signature, making them ideal for infantry operations.
Live Events
'The drones are a cost-effective solution for targeting relatively lower-end threats, such as groups of infiltrating terrorists on the border. The drones also feature a parachute recovery mechanism, allowing them to be retrieved and reused in case of an aborted mission," as reported by Manu Pubby for ET.
Indigenous Development and Cost Efficiency
Developed entirely in India by EEL, Nagastra-1 boasts over 75% indigenous content, reducing reliance on foreign sources. This domestic production capability has resulted in significant cost savings compared to similar systems previously acquired from foreign vendors. The drones are capable of operating in extreme temperatures and high-altitude conditions, further enhancing their strategic value.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


NDTV
24 minutes ago
- NDTV
Namrata Adani Joins International Schools Sports Organisation Advisory Board: "Aim To Create Future-Ready Institutions"
Adani International School has taken a major step to enhance the nation's sports education framework by entering into a collaboration with the International Schools Sports Organisation (ISSO). Namrata Adani, promoter of Adani International School, is now part of the advisory board of ISSO, India's only dedicated sports body for international curriculum schools affiliated with globally recognised boards such as the International Baccalaureate (IB), Cambridge, Edexcel, and the US-based National School Boards Association (NSBA). Through this collaboration, Adani International School will support ISSO — founded in 2017 — in scaling sporting infrastructure, enhancing athlete training, and promoting participation in global events. "We are at an inflection point in India's educational and sporting landscape," said Mrs. Namrata Adani of the Adani Group in a statement. "Through this collaboration, we aim to create inclusive, future-ready institutions where students are empowered to pursue excellence both in the classroom and on the sports field. It is an honour to support ISSO in establishing a structured, globally benchmarked sports culture for international schools in India." Aakanksha Thapak, director of ISSO, is optimistic that the collaboration with Adani International School will unlock greater possibilities. "We are delighted to welcome Mrs. Namrata Adani and the Adani Group as part of our shared vision for youth empowerment through sports. Over the years, ISSO has built a structured pathway for international school students to grow through competitive sport — from grassroots to national and international levels. With the leadership and forward-thinking vision of Mrs. Adani, this collaboration is set to further strengthen the ecosystem we've created. Together, we look forward to unlocking greater sporting possibilities and inspiring thousands of young athletes across international schools," she said.


Mint
an hour ago
- Mint
Pakistani hackers use pirated software to infect 1.88mn devices, steal credentials, earn $4.67mn: Report
A Pakistan-based cybercrime network has been linked to one of the largest and most profitable malware delivery operations uncovered in recent years, according to new research by cybersecurity intelligence company CloudSEK. The group, allegedly run by individuals connected through family ties in Bahawalpur and Faisalabad, is accused of exploiting demand for pirated software to distribute credential-stealing malware to millions of devices worldwide, the report highlighted. CloudSEK's report,The Anatomy of an Attack: Pakistan-Based Infostealer Delivery Network Exposed, details how the syndicate used search engine optimisation (SEO) poisoning, forum spam, and paid advertising to push cracked versions of popular software, including Adobe After Effects and Internet Download Manager, via malicious WordPress sites. The sites concealed malware such as Lumma Stealer, Meta Stealer, and AMOS inside password-protected archives. The operation is believed to have involved 5,239 registered affiliates and nearly 3,900 distribution sites, generating 449 million clicks and more than 1.88 million recorded installs. CloudSEK estimates the network's tracked revenue at $4.67 million, though the actual figure is likely higher due to unrecorded transactions. Payment records indicate affiliates were compensated via Payoneer (67 per cent) and Bitcoin (31 per cent), with the top earners taking in almost half of all payouts. In 2020 alone, more than $130,000 was paid to participants over a five-month period. Investigators linked the operation to two interconnected pay-per-install networks, active from 2018 until this month, and SpaxMedia, later rebranded as The campaign maintained hundreds of long-term domains alongside disposable short-lived addresses to evade takedowns. Reportedly, a significant breakthrough occurred when the operators themselves were compromised by infostealer malware, revealing internal credentials, payment histories, and links between individuals, domains, and financial accounts. CloudSEK's findings also coincide with a spike in cyberattacks on Indian government bodies and critical infrastructure in the run-up to the country's 79th Independence Day on 15 August 2025. According to the company's parallel investigation, more than 4,000 incidents were recorded in the weeks before the celebrations, targeting sectors such as defence, finance, and administration. The surge followed heightened tensions after the Pahalgam terror attack. Threat actors from Pakistan, China, and other countries are reported to have engaged in coordinated campaigns involving phishing emails, fraudulent websites, data breaches, and large-scale scams. Advanced Persistent Threat (APT) groups, including Pakistan-linked APT36 and China-based APT41, deployed credential theft operations aimed at harvesting sensitive government and corporate data. Authorities have warned citizens to be vigilant and to report suspicious activity, as attackers have been using methods such as spoofed domains, fake mobile applications, and social engineering schemes to lure victims. The timing of the attacks indicates a strategic intent to cause disruption during a national event. CloudSEK notes that the syndicate's use of legitimate payment services, mainstream advertising channels, and public-facing forums demonstrates how such large-scale operations can function openly. It recommends targeted domain seizures, financial disruption in cooperation with payment processors, search engine de-indexing of malware-hosting sites, and public awareness drives to counter both ongoing and future threats.


Indian Express
an hour ago
- Indian Express
From mule accounts to cryptocurrency, ED tracks how Parimatch routed users' funds, freezes Rs 110 crore
The Enforcement Directorate (ED) has frozen Rs 110 crore in various bank accounts as part of an ongoing probe into the Cyprus-based illegal online betting platform Parimatch, the central agency said on Thursday. The development comes after the ED conducted search operations at 17 locations, including Mumbai, Delhi, Noida, Jaipur, Surat, Madurai, Kanpur and Hyderabad, on Tuesday under the Prevention of Money Laundering Act (PMLA), 2002. In addition to the Rs 110 crore, various incriminating documents and digital devices were seized during the search, officials said. The ED initiated its investigation into Parimatch on the basis of a First Information Report registered at a cyber police station in Mumbai for allegedly duping users through its online betting platform. As per the agency, the platform defrauded investors by luring them with promises of high returns, generating over Rs 3,000 crore in a year, as revealed by the investigation to date. According to the ED, the searches revealed that Parimatch routed users' funds through mule accounts using different strategies across the country. In one case, funds deposited by users into mule accounts were allegedly withdrawn in cash in a specific locality in Tamil Nadu. This cash was allegedly handed over to hawala operators, who used it to recharge virtual wallets of a UK-based company. These wallets, as per the ED, were then used to buy USDT cryptocurrency in the name of mule crypto accounts, which were operated by Parimatch agents. In western India, Parimatch engaged the services of domestic money transfer (DMT) agents, according to the ED. Funds collected in mule accounts controlled by these DMT agents were allegedly sent to Parimatch agents through payments made by mule credit cards. More than 1,200 such credit cards were found and seized from a single location, an official said. The ED investigation has also uncovered that payment companies, whose applications for payment aggregator licenses were rejected by the RBI, offered their services to Parimatch in the garb of technology service providers (TSPs) and offered their application programming interface (API) to facilitate user fund collections. These TSPs allegedly offered the APIs to Parimatch agents who onboarded mule accounts opened in the name of e-commerce companies and payment solution provider companies for the collection of funds from users. This money was layered and transferred out in the garb of e-commerce refunds, chargebacks, vendor payments, etc., effectively concealing the actual flow and purpose of funds, the ED said. According to the agency, Parimatch gained visibility through aggressive marketing, including sponsorship of sports tournaments and partnerships with celebrities. They allegedly also set up Indian entities to run surrogate advertisements under the names 'ParimatchSports' and 'Parimatch News'. Payments to these agencies were made via foreign inward remittances, the ED said.