NCSC shares technical details of spyware targeting Uyghur, Tibetan and Taiwanese groups

Avatar

The U.K.’s National Cyber Security Centre and international cybersecurity and intelligence agencies on Wednesday said hackers are deploying two forms of previously identified spyware to snoop on Uyghur, Tibetan and Taiwanese individuals and civil society organizations.

The surveillance software — labeled MOONSHINE and BADBAZAAR — breaks into device microphones and cameras and harvests messages, photos and location data, allowing users to be monitored in real time without their knowledge.

The NCSC, part of the U.K.’s GCHQ intelligence agency, as well as international government and industry partners, uncovered the technical underpinnings of the surveillance software and offered guidance and technical analysis to cybersecurity experts and app store operators and developers.

Spyware-infected apps are being used to target individuals and organizations worldwide who are tied to activities “considered by the Chinese state to pose a threat to its stability,” NCSC said in a press release.

Device owners who are thought to be most at risk of targeting are those tied to Taiwan’s independence movement, Tibetan rights organizations and Uyghur Muslims. Ethnic minorities in or from China’s Xinjiang Uyghur Autonomous Region, those advocating for democracy and members of the Falun Gong faith are also believed to be at risk.

Some of the apps mimic popular platforms like WhatsApp and Skype, while others have been set up as standalone platforms to attract interest from potential victims in the targeted communities. 

Two standalone apps, Tibet One and Audio Quran, are available in users’ native languages and are pushed in online gathering places known to attract members of the targeted communities. 

For example, hackers shared the Tibet One app in Telegram channels focused on the region and in relevant Reddit forums, NCSC said.

Tibet One is an iOS app which was uploaded to the Apple App Store in December 2021 but has since been removed. The NCSC said “malicious actors” created the app as a vehicle for infecting users’ devices with BADBAZAAR spyware.

The Audio Quran app uses MOONSHINE spyware to track Uyghurs, NCSC said, creating trust by using the Uyghur language in the file name and describing itself as containing content related to the Quran, the main religious text of Islam.

Taiwan has never been governed by China, but Beijing has made it clear that it wants to unify the country with the mainland and is considering military force to do so.

The Uyghurs are a Muslim minority in China. The Chinese government has reportedly held over a million Uyghurs in reeducation camps for nearly a decade.

Parts of Tibet are an autonomous region within China, whose government has cracked down on an independence movement there.

“We are seeing a rise in digital threats designed to silence, monitor, and intimidate communities across borders,” NCSC Director of Operations Paul Chichester said in a statement.

The NCSC is warning at-risk populations to only use known app stores, check apps once installed and routinely review permissions, report questionable messages and files and carefully inspect shared files and links on social media.

CybercrimeChinaNewsTechnologyPrivacy
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

Suzanne Smalley

is a reporter covering privacy, disinformation and cybersecurity policy for The Record. She was previously a cybersecurity reporter at CyberScoop and Reuters. Earlier in her career Suzanne covered the Boston Police Department for the Boston Globe and two presidential campaign cycles for Newsweek. She lives in Washington with her husband and three children.

 

Total
0
Shares
Previous Post

Microsoft: Zero-day bug used in ransomware attacks on US real estate firms

Next Post

Adobe Patches 11 Critical ColdFusion Flaws Amid 30 Total Vulnerabilities Discovered

Related Posts

SANS Institute Warns of Novel Cloud-Native Ransomware Attacks

The latest Palo Alto Networks Unit 42 Cloud Threat Report found that sensitive data is found in 66% of cloud storage buckets. This data is vulnerable to ransomware attacks. The SANS Institute recently reported that these attacks can be performed by abusing the cloud provider’s storage security controls and default settings. “In just the past few months, I have witnessed two different methods for
Avatar
Read More

Storm-1977 Hits Education Clouds with AzureChecker, Deploys 200+ Crypto Mining Containers

Microsoft has revealed that a threat actor it tracks as Storm-1977 has conducted password spraying attacks against cloud tenants in the education sector over the past year. "The attack involves the use of AzureChecker.exe, a Command Line Interface (CLI) tool that is being used by a wide range of threat actors," the Microsoft Threat Intelligence team said in an analysis. The tech giant noted that
Avatar
Read More