Tibetan activists, diaspora hit by resurfacing malware in cyberespionage operation

The Tibetan diaspora has once again fallen victim to a sophisticated malware campaign similar to one detected in 2016, reports Citizen Lab after receiving the infected files from one of the targets – a Tibetan NGO. It appears the campaign was act… Continue reading Tibetan activists, diaspora hit by resurfacing malware in cyberespionage operation

Malware campaign that targeted Tibet’s diaspora linked to wider operation

A malware campaign earlier this year against members of Tibet’s diaspora was part of a wider operation that also targeted governments and industries in the Asia-Pacific region, according to a new report released Wednesday by Citizen Lab.  The malware campaign, active from January into March, targeted Tibetan activists and journalists, members of the Tibetan Parliament in exile and the India-based Central Tibetan Administration, according to Citizen Lab. Relying heavily on low-cost spearphishing techniques, the anonymous attackers disguised malicious PowerPoint and Microsoft Rich Text Format documents as links from human rights NGOs.  According to the report, the Tibetan malware targets, wary of unsolicited emails, forwarded the messages to Citizen Lab, a University of Toronto-based interdisciplinary laboratory that specializes in human rights and security.  The attacks are similar to a 2016 malware campaign nicknamed the “Parliamentary Campaign” by Citizen Lab. It also targeted parliamentarians. The number of Tibetans in exile is estimated at more than […]

The post Malware campaign that targeted Tibet’s diaspora linked to wider operation appeared first on Cyberscoop.

Continue reading Malware campaign that targeted Tibet’s diaspora linked to wider operation

It’s super cheap to launch an effective cyber-espionage scheme

Putting together a thorough cyber-espionage campaign in order to spy on hundreds of people can be surprisingly inexpensive, new research by Citizen Lab explains and private sector cybersecurity experts agree. Over the course of nearly two years, Citizen Lab estimated that a hacking group possibly linked to the Chinese government had spent $1,068 in order to stand up computer systems that were used to target people primarily linked to Tibet; an autonomous territory bordering Nepal and Bhutan that is loosely controlled by the Chinese government. This activity illustrates to some degree how in certain environments, largely because of poor digital security practices, an attacker can run an effective yet rudimentary scheme to collect intelligence from multiple organizations all at once. Experts say that while Citizen Lab’s findings are not unique, it paints a picture of how cheap and scalable hacking techniques — including email phishing and web exploit kits — are part […]

The post It’s super cheap to launch an effective cyber-espionage scheme appeared first on Cyberscoop.

Continue reading It’s super cheap to launch an effective cyber-espionage scheme