• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 

CrushFTP zero-day actively exploited at least since July 18

 | 

Hardcoded credentials found in HPE Aruba Instant On Wi-Fi devices

 | 

MuddyWater deploys new DCHSpy variants amid Iran-Israel conflict

 | 

U.S. CISA urges to immediately patch Microsoft SharePoint flaw adding it to its Known Exploited Vulnerabilities catalog

 | 

Microsoft issues emergency patches for SharePoint zero-days exploited in "ToolShell" attacks

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Malware
  • Security
  • First APT attack on Android targeted Tibetan & Uyghur activists

First APT attack on Android targeted Tibetan & Uyghur activists

Pierluigi Paganini March 27, 2013

Read about APT attacks has become customary, even easier to hear of attacks against political dissidents or minorities as Tibetan and Uyghur activists, but never before has been exploited the Android platform for this type of offensive.

In the past Tibetan minorities have been already targeted with malware able to infect Windows and Mac OSs, today researchers at Kaspersky Lab revealed an APT attack that targeted Android devices.

“Until now, we haven’t seen targeted attacks against mobile phones, although we’ve seen indications that these were in development,”

The report states:

“Every day, there are hundreds if not thousands of targeted attacks against Tibetan and Uyghur supporters,” “The vast majority of these target Windows machines through Word documents exploiting known vulnerabilities such as CVE­2012­0158, CVE­2010­3333 and CVE­2009­3129.”

As usual, the attackers started the operation gaining access to an email account of one of the victims, a high ­profile Tibetan activist, to send spear phishing emails to all the individuals directly connected to this one.

The attackers hacked the first account on March 24th, 2013 to send to the victim’s contact list a malicious Android Package (APK) attachment titled “WUC’s Conference.apk”.

 APT_Tibet_Mail

 

The attacks is based on social engineering technique to catch victim’s attention with a topic of interest such as an email having as subject a human rights conference event in Geneva.

When user opens the apk file,  the Android package is installed on the device and on its desktop appears an application named “Conference” as shown in the following picture.

Uyghur APT_Tibet_Android_App

 

At this point it is sufficient that victim executes the app to activate the malware code that contacts the Command & Control server located in the US, Los Angeles, and sends it the data acquired from the device.

The malware sends out data to the C&C server when control structure send it an instruction via SMS messages that contains one of the following commands: “sms”, “contact”, “location”, “other”.

In the same time to the victim is presented a fake message from “Dolkun lsa
Chairman of the Executive Committee Word Uyghur Congress”.

Analyst at Kaspersky discovered a domain that points to the same C&C server IP address: “DlmDocumentsExchange(dot)com” registered on March 8th, 2013 to “peng jia” with an email address bdoufwke123010(at)gmail.com.

The C&C server is hosting an index page that serves up an APK file named “Document.apk” that is the equivalent of the Conference.apk but uses text in Chinese and it proposes information on the dispute between China and Japan on  “Senkaku Islands / Diaoyudao Islands / Diaoyutai Islands”.

The researches of Kaspersky highlight the fact that attacker used wrongly the word “Word” instead of “World” in the message, confirming the hypothesis that the attackers may not be English-speaking, The command ­and­ control server has Windows Server 2003 OS and uses Chinese language suggesting involvement of Chinese individuals.

The hackers collect various information related to the victims such as contacts, communication data (SMS messages and call logs), geolocation and info on the targeted mobile (OS, SDK version, and model), all the data are sent to the C&C in encoded Base64 format.

Analyzing the code security experts noted that authors log various procedure of the malware, probably for debugging purposed, circumstance that suggests that the malicious code may be a prototypal version.

Security experts at Kaspersky have no doubts, this is perhaps the first in a new wave of targeted attacks aimed at Android users that will exploit zero-day vulnerabilities, exploits or a combination of techniques.

The post concluded with the following statement

“For now, the best protection is to avoid any APK attachments that arrive on mobile phones via e-mail.”

For completeness of information I report that malware used in this attack as been dubbed “Backdoor.AndroidOS.Chuli.a.”, its digests are

MD5s:

  • c4c4077e9449147d754afd972e247efc Document.apk
  • 0b8806b38b52bebfe39ff585639e2ea2 WUC’s Conference.apk

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – Uyghur, hacking)

[adrotate banner=”5″]

[adrotate banner=”13″]


facebook linkedin twitter

Android APT exploits human rights Kaspersky Lab mlaware phishing Social Engineering Tibet zero-day vulnerabilities

you might also like

Pierluigi Paganini July 25, 2025
Operation CargoTalon targets Russia’s aerospace with EAGLET malware,
Read more
Pierluigi Paganini July 25, 2025
Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

    Intelligence / July 25, 2025

    Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

    Security / July 25, 2025

    Koske, a new AI-Generated Linux malware appears in the threat landscape

    Malware / July 25, 2025

    Mitel patches critical MiVoice MX-ONE Auth bypass flaw

    Security / July 25, 2025

    Coyote malware is first-ever malware abusing Windows UI Automation

    Malware / July 24, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT