
India demands halt to Hong Kong auction of sacred Buddha relics
India has demanded the immediate suspension of an auction in Hong Kong featuring a portion of Buddhist relics excavated over a century ago, calling the sale illegal and unethical.
The relics, listed for auction by Sotheby's Hong Kong on 7 May, include gemstones and ritual items associated with Buddha.
The Ministry of Culture announced on Monday that it had served a legal notice to Sotheby's and to Chris Peppe, a descendant of William Claxton Peppé, the British colonial officer who unearthed the relics at Piprahwa in 1898.
The government is seeking their repatriation to India, describing them as an inseparable part of the country's religious and cultural heritage.
'These relics, excavated from the Piprahwa Stupa – widely recognised as the ancient city of Kapilavastu, the birthplace of Lord Buddha – hold immense historical and spiritual significance,' the ministry said in its statement.
The auction, titled The Piprahwa Gems of the Historical Buddha, Mauryan Empire, Ashokan Era, circa 240–200 BC, features bone fragments, crystal and soapstone reliquaries, gold ornaments and precious stones such as garnets, pearls, and amethysts.
They were originally buried in a stupa, a sacred Buddhist funerary mound in Piprahwa, believed to be in present day Indian state of Uttar Pradesh, and included offerings said to have been made during the reinterment of the Buddha's remains more than 200 years after his death around 480 BC.
An inscription in Brahmi script found on one of the reliquaries links the items to the Sakya clan, the Buddha's family.
The majority of the relics were transferred to the Indian Museum in Kolkata in 1899 and have since been designated 'AA' antiquities under Indian law, making their sale or export prohibited. A portion of the bone relics was gifted to the Buddhist monarch, King Chulalongkorn of Siam (now Thailand), while some of the remaining artefacts stayed with the Peppé family.
The ministry has accused the auction house of 'participating in continued colonial exploitation' and stated that these relics must not be treated as archaeological specimens but rather as 'the sacred body' of the Buddha, deserving of religious veneration.
"These relics – referred to as 'duplicate jewels' – constitute inalienable religious and cultural heritage of India and the global Buddhist community.' the notice read. 'Their sale violates Indian and international laws, as well as United Nations conventions.'
A post on the ministry's official X (formerly Twitter) account confirmed that Sotheby's had responded with the assurance that 'full attention' is being given to the matter. However, the auction listing remained active at the time of writing.
During a bilateral meeting on 2 May, culture minister Gajendra Singh Shekhawat raised the issue with the UK's secretary of state for culture, media and sport, Lisa Nandy. Mr Shekhawat reportedly urged swift intervention to stop the sale and ensure the relics are returned to India.
India's culture secretary also chaired a high-level review meeting on Monday to coordinate further action. The Ministry of External Affairs has been asked to engage through diplomatic channels in both Hong Kong and the UK, while the Financial Intelligence Unit is coordinating with its Hong Kong counterpart to underline the illegality of the auction.
The Independent has reached out to Sotheby's for comments.
In a post on Sotheby's website, Mr Peppe, who is now based in Los Angeles, stated that he and two cousins inherited the relics in 2013 and began research into their historical context. He maintains that the relics are not corporeal remains of the Buddha but rather offerings from a later period.
'I have not found any Buddhists who claim the gems are corporeal remains,' he previously told The Guardian, adding: 'Legally, the ownership is unchallenged.'
However, the Indian government has rejected that interpretation. In its legal notice, it argued that relics placed in stupas are sacred grave goods that cannot be commodified.
It called upon Sotheby's and Mr Peppe to issue a public apology and disclose any additional relics still in their possession or previously transferred to other individuals or institutions.
The ministry also threatened legal action in Indian and Hong Kong courts and through international bodies, and pledged to launch a public campaign against what it called Sotheby's role in 'perpetuating colonial injustice'.
'We call upon Sotheby's Hong Kong to immediately withdraw the relics from auction and cooperate with Indian authorities to return these sacred artefacts to their rightful place,' the statement concluded.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Daily Mirror
40 minutes ago
- Daily Mirror
Gloating email from M&S hackers to CEO confirms motives behind cyber attack
A email has come to light sent to the boss of Marks & Spencer from a now notorious gang of online hackers called DragonForce, who are also believed to be behind an attack on the Co-op A gloating email from a gang of cyber hackers to Marks & Spencer has emerged. The message - to M&S boss Stuart Machin - confirms for the first time that retailer had been targeted by the ransomware group. In it, they wrote: 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers." It then says "The dragon wants to speak" before giving a link to the darknet - - a hidden part of the internet. The email, seen by the BBC, was sent on April 23 from the hacker group called DragonForce. The gang apparently used the account of an employee from the Indian IT giant Tata Consultancy Services, which has provided IT services to M&S for over a decade. M&S has been left reeling by the cyber attack, which has seen its online clothing, homewares and beauty sales for more than six weeks. The retailer has already estimated it could wipe £300million off its annual profits. Online has become an increasingly important to M&S - as for other retailers - and had more than 10 million 'active' customers and over £1.3billion a year of sales. Join Money Saving Club's specialist topics According to the BBC, the email is in broken English and includes a racist term. It was sent to Mr Machin and seven other executives. As well as bragging about infecting M&S's IT systems with ransomware, they also claim to have stolen the private data of millions of customers. A link in the email connects to a portal on the so-called darknet for DragonForce, the ransomware used in the attack. The hackers wrote: 'let's get the party started. Message us, we will make this fast and easy for us.' The message also appears to suggest the crooks may have details about M&S's cyber insurance policy, saying 'we know we can both help each other handsomely : ))'. M&S has said insurance should reduce the overall £300million hit. M&S has refused to say if the company has paid a ransom to the hackers. M&S is among a wave of companies struck by ransomware - a form of malicious software designed to burrow into companies' systems, steal commercially sensitive information, which is then locked, with crooks demanding their victims pay money before handing them the key. The Co-op and Harrods have also been hit recently. The gang has previously claimed the Co-op narrowly avoided being locked out of its own computer systems. On May 21, M&S said it hoped to resume online sales 'within weeks'. It also warned its operations could be out of action until as late as July, though it expected to begin resuming orders sooner than that. The gang known as DragonForce has been implicated in the first two of those, but speculation is rife about who -or what -it is. While it seems to have first emerged up to two years, experts say they use operate in a similar way to others that specialise in creating ransomware Another gang known as Scattered Spider -with members said to be aged as young as 16 -is said to have used DragonForce's ransomware in the M&S attack. DragonForce's rumoured link to Russia has been fuelled by the fact that a number of other ransomware attacks have been launched from the country in the past. Other reports have linked DragonForce to a pro-Palestinian group located in Malaysia. There has also been speculation about the group's motives, and that they could be political in some way.


Daily Mail
2 hours ago
- Daily Mail
Revealed: Gloating message sent by hackers 'from China' to M&S boss after devastating cyber-attack on British retailer
Hackers who crippled Marks & Spencer during a devastating cyber-attack sent the retailer's boss an abusive email gloating about what they had done. Shameless digital fraudsters from the DragonForce hacking group reportedly sent the message to M&S chief executive, Stuart Machin using an employee email account. The email, sent in broken English on April 23, appears to confirm for the first time that M&S was hacked by the notorious ransomware group - something the retailer has so far refused to acknowledge. 'We have marched the ways from China all the way to the UK and have mercilessly raped your company and encrypted all the servers,' the hackers wrote, the BBC reported. 'The dragon wants to speak to you so please head over to [our darknet website].' A darknet link shared in the email connected to a portal for DragonForce victims to negotiate a ransom fee. The crime syndicate added: 'Let's get the party started. Message us, we will make this fast and easy for us.' The cyber hack over the Easter break has been hugely damaging for British high street staple, M&S, costing an estimated £300million. Six months on from the digital blitz, and the retailer is still unable to take online orders. The hack has cause mayhem for Marks & Spencer meaning it was unable to process online orders. The retailer later warned some customers' personal details had been stolen According to the BBC, the extortion email was sent to Mr Machin and seven other top executives. The blackmail message reportedly included a racist term. It was reportedly ended with an image of a fire-breathing dragon. As well as boasting about installing ransomware to cripple M&S's IT systems, the hackers said they had also stolen the private data of millions of customers. M&S informed customers three weeks later that contact details and dates of births from some shoppers had been snatched by a suspected cyber cartel. And the retailer also admitted other personal details had also been pilfered by digital crooks, including customers' order histories. However, bosses at the chain have insisted no data relating to shoppers' payment or card details, or account passwords, had been taken. It's unclear exactly how many shoppers have been affected by the major data breach. However, the group had 9.4 million active online customers in the year to March 30, according to its last full-year results. DragonForce's bragging email was apparently sent using the account of an employee from IT company Tata Consultancy Services (TCS), which has provided IT services to M&S for over a decade. What is DragonForce? DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's thought the group operates globally, with hackers operating out of China. Researchers also believe the group also has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. The Indian IT worker had an M&S email address, but is a paid TCS employee and based in London. It is believed that he was among the victims hacked during the devastating digital blitzkrieg that has ravaged M&S online systems. The IT company has previously said it is investigating whether it was a gateway for the cyberattack. It has since told the BBC the email was not sent from its system and has nothing to do with the breach. M&S has declined to comment on the latest revelations in the hacking crisis. As well as claiming responsibility for the M&S hack, DragonForce also says it is behind the ongoing cyber-attack against the Co-op. The two hacks took place in April and have wrought chaos for both retailers. Empty shelves in some stores were reported by customers of both businesses, while M&S fears disruption to its services will continue into next month. However, experts believe it could take 'months' for M&S to fully recover from the hack, which wiped a staggering £1billion off the retailer's market value in the weeks after the mayhem. Matt Hull, head of threat intelligence at global cyber security company NCC Group, said the M&S meltdown could potentially have massive ramifications for shoppers. Warning of the impact, Mr Hull told MailOnline: 'The data breach at M&S is a stark reminder that no organisation is completely immune from cyber threats, and that all forms of customer data requires stringent protection.' He added cyber crooks could seek to use the data they have allegedly obtained to launch a fresh wave of attack on countless unsuspecting victims. 'Despite the absence of financial data or passwords, threat actors could potentially use the stolen information to launch targeted social engineering attacks,' he warned. It is unclear who the actual hackers involved in the DragonForce's alleged cyber assault actually are. The incident is being probed digital experts from Britain's own 'FBI', the National Crime Agency. DragonForce reportedly offers cyber-criminal partners various services on their darknet site in exchange for a 20 per cent cut of any ransoms collected. It's believed the group operates worldwide, with connections to countries across Asia, with some operating in China. Researchers believe the group has links to Russia. DragonForce Malaysia - thought to be an offshoot of the main group - is thought to be made up of pro-Palestine 'hacktivists'. They have reportedly been behind several campaigns targeting government agencies and organisations across the Middle East and Asia, filling a void left by hacking collective, Anonymous. Speculation has been mounting that hacking collective, Scattered Spider, may also have been involved in the recent spate of retail cyber attacks. The group, thought to be made up of young English-speaking hackers from the West, might be one of DragonForce's affiliates. Members are known to include teenagers and young adults from the UK and US. A spokeswoman for M&S told MailOnline: 'We cannot comment on details of or speculation on the cyber incident, and we have been advised not to.'


Daily Record
2 hours ago
- Daily Record
Chilling new Madeleine McCann theory puts UK man at centre amid drink drive claims
The newspaper said the British sister of the unnamed man at the centre of the new theory tipped off police in the UK in 2018. Following fresh searches in Portugal for Madeleine McCann, a British man is now at the centre of a new theory after being reportedly overheard saying five chilling words by a witness the day after the tot went missing. It was revealed on June 6 that German prosecutors refused to investigate a couple who claimed to have hit Madeleine in a drink-driving accident. The tot vanished on holiday in Portugal on May 3, 2007. According to Portuguese newspaper Correio da Manhã, Portuguese authorities demanded action after receiving a chilling tip-off from a British woman who believed her own brother and his German wife may be hiding the truth about Madeleine's disappearance, reports the Mirror. Investigators in Portugal asked German officials for permission to deploy an undercover officer with a fake identity to get close to the wife - suspected of being behind the wheel of the car that allegedly struck Madeleine, but German authorities reportedly shut the request down. The newspaper said the British sister of the unnamed man at the centre of the new theory tipped off police in the UK in 2018. 'German prosecutors were asked to authorise a covert police operation with someone posing as a friend of the woman's and trying to get her to confess, but the courts refused,' it added. 'It was decided to continue solely with the investigation into suspect Christian Brueckner, rejecting other possibilities.' Describing the mystery couple as 'alcoholics' and placing the British man's wife in a café near the Ocean Club where she had been 'drinking' the night Madeleine went missing from the Algarve resort. Correio da Manha also reported another witness described as the couple's neighbour told police separately she heard the couple rowing the day after the three-year-old disappeared. She said she heard the man repeatedly yelling: 'Why did you bring her?' Portuguese police claim they were shut down by the Germans after urging them to look more closely into the possibility the woman had driven home 'drunk' with Madeleine after hitting her. Join the Daily Record WhatsApp community! Get the latest news sent straight to your messages by joining our WhatsApp community today. You'll receive daily updates on breaking news as well as the top headlines across Scotland. No one will be able to see who is signed up and no one can send messages except the Daily Record team. All you have to do is click here if you're on mobile, select 'Join Community' and you're in! If you're on a desktop, simply scan the QR code above with your phone and click 'Join Community'. We also treat our community members to special offers, promotions, and adverts from us and our partners. If you don't like our community, you can check out any time you like. To leave our community click on the name at the top of your screen and choose 'exit group'. If you're curious, you can read our Privacy Notice. Correio said the unnamed British man had now died, but did not say whether his German wife was still alive. In a front page report today, the newspaper claimed: 'The German police refused to co-operate with Portugal's Policia Judiciaria in the investigation of a clue that pointed towards Madeleine McCann being run over. 'In 2018 a British woman went to police in the UK to say she suspected her brother had been involved in the disappearance of the youngster. She said her brother was an alcoholic and since the day Madeleine vanished had appeared to hide a painful secret. 'When British police exchanged information with the PJ, a coincidence was discovered. On May 4 2007 a woman told police she had heard her neighbours arguing. They were both alcoholics, he was English and she was German, and she heard the man shouting repeatedly: 'Why did you bring her?' 'The neighbour discovered afterwards it was the man whose sister had reported him to police and was married to the woman who had been drinking in a café next to the Ocean Club where little Madeleine was staying with her parents and twin siblings. 'Another report the police had indicated that in an identical car to the one the woman was then using, around the time of Madeleine's disappearance, a female and little girl had been seen inside. The PJ concluded she could have run Madeleine over and panicked.' The newspaper also claimed the mystery British man had always 'refused to tell his sister if he had been involved in Madeleine's death' before she alerted the authorities. Portuguese police are yet to respond to the Correio da Manha newspaper report. German police yesterday wrapped up a three-day search on the ground near prime suspect Christian Brueckner's old cottage home close to Praia da Luz where Madeleine disappeared on May 3, 2007.