teensexonline.com
34.2 C
Jammu
Thursday, May 1, 2025
HomeChinaChina Hackers Used Trojanized UyghurEditPP App to Target Uyghur Activists

China Hackers Used Trojanized UyghurEditPP App to Target Uyghur Activists

Date:

Related stories

ECI Launches New Steps to Clean Voter Rolls, Unveils New Voter-Friendly Measures

The Election Commission has introduced new initiatives aimed at...

India reiterates commitment to Gaza peace, calls for immediate ceasefire, safe release of hostages

​India has reiterated its commitment to working closely with...

India closes airspace to Pakistan Airlines

India has closed its airspace for Pakistan Airlines in...

WAVES Summit 2025 to create new economic opportunities: I&B Minister Ashwini Vaishnaw

Information and Broadcasting Minister Ashwini Vaishnaw has said the...

China-linked hackers targeted Uyghur activists using a Trojanized UyghurEditPP app in a spear-phishing campaign, Citizen Lab researchers reveal.

Citizen Lab reveals a targeted spear phishing campaign aimed at Uyghur activists, deploying surveillance malware disguised as a legitimate Uyghur language tool. Learn about the attack methods and suspected Chinese government involvement.

In March 2025, several leading figures within the World Uyghur Congress (WUC), an international organization based in Munich that advocates for the rights of the Uyghur people, became the targets of a carefully orchestrated cyber espionage attempt.

Researchers at the University of Toronto’s Citizen Lab report that these individuals received warnings from Google, indicating that their online accounts were under attack, allegedly, by state-sponsored actors.

The method used in this campaign was spear phishing, which is a targeted form of attack where emails are crafted to appear legitimate and trustworthy to specific individuals. In this case, the malicious emails impersonated a known contact from a partner organization of the WUC.

These emails contained links to Google Drive, which, if clicked, would lead to the download of a password-protected archive file. This archive held a compromised version of UyghurEditPP, a genuine open-source word processing and spell-check tool specifically designed for the Uyghur language.

The recipients had no idea that this seemingly harmless application was Trojanized, meaning it contained a hidden backdoor. Once the infected UyghurEditPP was executed on a victim’s computer, this backdoor would silently gather system information, including the machine name, username, IP address, operating system version, and a unique hash derived from the hardware. This data was then transmitted to a remote command-and-control (C2) server.

The server’s operators could then send instructions back to the infected device, enabling them to perform various malicious actions such as downloading files from the target, uploading additional malicious files (including further malware), and executing commands through uploaded plugins.

Latest stories