Thursday, February 9, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Chinese Spyware Targets Uyghurs Through Apps: Report

Researcher by Researcher
November 11, 2022
in Cybersecurity
0
High-Severity Flaw in Argo CD is Information Leak Risk
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Cybersecurity researchers said they have found evidence of Chinese spyware in Uyghur-language apps that can track the location and harvest the data of Uyghurs living in China and abroad.

Uyghurs are a Turkic Muslim minority predominantly in China’s northwestern region of Xinjiang, where a recent UN report said Beijing may have committed crimes against humanity.

Related articles

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

The United States and lawmakers in other Western countries say China’s treatment of the Uyghurs amounts to genocide.

A Thursday report by San Francisco-based cybersecurity firm Lookout claims that since 2018, multiple Uyghur-language Android apps have been found to be infected with two strains of spyware linked to Chinese state-backed hacker groups.

They include dictionaries, religious apps, maps and even pirated versions of WhatsApp available on third-party stores or shared on Uyghur-language channels on Telegram.

They were not available on the official Google Play store, which is blocked in China, leading Chinese users to use third-party app stores.

The spyware enabled hackers to collect sensitive data including a user’s location, contacts, call logs, text messages and files, the report said, and could also take photos and record calls.

Researchers said the apps could have been used to detect evidence of religious extremism or separatism, for which Uyghurs have been imprisoned, some for decades, as part of a sweeping anti-terrorism crackdown in Xinjiang which observers say amounts to a mass detention campaign.

Large Uyghur diaspora populations also live in central Asia and Turkey.

“The campaign appears to primarily target Uyghurs in China. However, we found evidence of broader targeting of Muslims and Uyghurs outside of Xinjiang,” the report said. 

“Several of the samples we analyzed masqueraded as mapping apps for other countries with significant Muslim populations, like Turkey or Afghanistan.”

– Surveillance state –

For years, China has engaged in mass monitoring of Uyghurs in Xinjiang, creating a province-wide surveillance platform that vacuums Uyghurs’ personal data from their phones and tracks their movements through facial recognition. 

Several Chinese surveillance and camera firms have been sanctioned by the US for alleged complicity in human rights violations.

Uyghurs living abroad have spoken of attempts at cross-border surveillance and coercion from Chinese police back in Xinjiang. 

Liu Pengyu, a spokesperson at the Chinese Embassy in Washington, told Bloomberg News “we oppose wild guesses and malicious slurs against China”, adding the country opposes “all forms of cyber attacks”.

Samples of the infected apps were dated from 2018 onwards, and the vast majority of apps infected with one strain of spyware were discovered in the second half of this year, the report said.

“Despite growing international pressure, Chinese threat actors operating on behalf of the Chinese state are likely to continue to distribute surveillanceware targeting Uyghur and Muslim mobile device users through Uyghur-language communications platforms,” Lookout researchers wrote.

view counter

© AFP 2022

Tags:



Source link

Tags: AppsChinesereportspywaretargetsUyghurs
Share76Tweet47

Related Posts

New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
0

Ransomware was down last year, though LockBit led threat actors and employees opened a third of the toxic emails in...

New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
0

Several days after news of exploit attempts against a zero day vulnerability in the GoAnywhere MFT secure file transfer tool...

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

The New Frontier of Data Security: Exploring the Potential of Quantum Random Number Generators (QRNGs) | by Binu Panicker | Feb, 2023

February 8, 2023
0

World’s fastest real-time quantum random number generator with a photonic integrated chip. Credit: Bing Bai and Yao ZhengThe world of...

Sentra Raises $30 Million for DSPM Technology

Germany Appoints Central Bank IT Chief to Head Cybersecurity

February 8, 2023
0

The German government announced the appointment Tuesday of the European Central Bank’s head of IT systems to lead the national...

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

Metaverse Adds New Dimensions to Web 3.0 Cybersecurity

February 8, 2023
0

With more companies investing in Web 3.0 this year, including blockchain, gaming and the metaverse, the cat and mouse game...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023
“Fintech Right Now is a Boys Club” – How to Close the Gender Gap in Fintech with Stax

Spotlight: How the Isle of Man Became an Insurtech Hub

February 8, 2023

Recent Posts

Google’s AI Chatbot Is Out To Rival ChatGPT

Google’s AI Chatbot Is Out To Rival ChatGPT

February 9, 2023
New cybersecurity data reveals persistent social engineering vulnerabilities

New cybersecurity data reveals persistent social engineering vulnerabilities

February 9, 2023
New ToddyCat APT Targets Exchange Servers

Fortra Patches Actively Exploited Zero Day in GoAnywhere MFT

February 8, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved