{"id":2405,"date":"2016-01-25T23:46:44","date_gmt":"2016-01-25T23:46:44","guid":{"rendered":"https:\/\/www.iuhrdf.org\/en\/2016\/01\/25\/single-group-hackers-targets-uyghur-tibetan-activists\/"},"modified":"2016-01-25T23:46:44","modified_gmt":"2016-01-25T23:46:44","slug":"single-group-hackers-targets-uyghur-tibetan-activists","status":"publish","type":"post","link":"https:\/\/iuhrdf.org\/en\/single-group-hackers-targets-uyghur-tibetan-activists\/","title":{"rendered":"Single group of hackers targets Uyghur, Tibetan activists"},"content":{"rendered":"<p>The information sought would be of most interest to a nation-state, Palo Alto said in a new report<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Jeremy Kirk<br \/>IDG News Service<br \/>Jan 24, 2016 5:52 PM<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">A years-long campaign of seemingly disparate cyberattacks against Tibetan and Uyghur activists likely comes from a single group of hackers, according to a&nbsp;<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/01\/scarlet-mimic-years-long-espionage-targets-minority-activists\" style=\"color: rgb(37, 167, 215); box-sizing: border-box;\">seven-month study<\/a>by Palo Alto Networks.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The computer security company also concluded that the information stolen by the group, nicknamed Scarlet Mimic, would be of little interest to entities other than a nation-state.<\/p>\n<div style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">&#8220;The majority of attacks we identified were targeting Uyghurs or Tibetans or advocates thereof,&#8221; Olson said.<\/div>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Several other security companies, including Kaspersky Lab and Trend Micro, and&nbsp;<a href=\"https:\/\/citizenlab.org\/\" style=\"color: rgb(37, 167, 215); box-sizing: border-box;\">Citizen Lab<\/a>, part of the University of Toronto, have studied attacks against the activist groups, which have long been at odds with the Chinese government. Palo Alto&#8217;s report noted, however, that it did not have direct evidence linking the attacks to China.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Palo Alto undertook a study of forensic clues related to many attacks seen by security companies.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">&#8220;All of these [attacks] are actually connected, they&#8217;re all coming from the same group,&#8221; said Ryan Olson,&nbsp;intelligence director with Palo Alto. &#8220;They all share infrastructure with each other, and they&#8217;re all using the same tools. This is really a concerted effort by some organization.&#8221;<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Olson said the research also indicated the attackers have broadened their targets in an effort to gain more information.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">&#8220;One of the interesting shifts that we&#8217;ve seen in who they&#8217;re targeting is that we saw two attacks against government organizations, both of whom are interested in tracking terrorists and activists,&#8221; Olson said.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Those attacks have been directed at Russia and India, according to Palo Alto&#8217;s report. They&#8217;re interesting because government organizations tend to be much better at defending cyberattacks than activists.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Scarlet Mimic usually targets victims via email, with so-called &#8220;decoy&#8221; documents that have been rigged to deliver malware. The documents are titled in ways that are attractive to the recipient.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Sometimes such attacks cause applications such as Microsoft Word to crash, which might raise suspicion among victims. Olson said they&#8217;ve refined the attacks, however.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The malware has been configured to actually write a clean Word document or PDF to the system and open it automatically.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">&#8220;The document itself contains the actual content they expected to see when they opened the attachment,&#8221; Olson said.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">A study conducted by&nbsp;The Citizen Lab, a Canadian think tank that&#8217;s part University of Toronto&#8217;s Munk School of Global Affairs, found activist groups have&nbsp;<a href=\"http:\/\/www.cso.com.au\/article\/559435\/rights-groups-ngos-struggle-against-malware-attacks\/\" style=\"color: rgb(37, 167, 215); box-sizing: border-box;\">fewer resources<\/a>&nbsp;to defend themselves against cyberattacks.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Still, Scarlet Mimic&#8217;s attacks are not particularly advanced: the software vulnerabilities targeted are often years old. The malware installed, a Windows backdoor called&nbsp;<a href=\"https:\/\/www.google.com.au\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;ved=0ahUKEwiOqNiXzsPKAhVCW6YKHcDkCGsQFggyMAA&amp;url=http%3A%2F%2Fwww.trendmicro.com.au%2Fcloud-content%2Fus%2Fpdfs%2Fsecurity-intelligence%2Fwhite-papers%2Fwp-fakem-rat.pdf&amp;usg=AFQjCNG_XYGDQPsoaFdO9FkzAlAyNdQCEw&amp;sig2=jN2Yx_cA53EGTWSvGbvkoA\" style=\"color: rgb(37, 167, 215); box-sizing: border-box;\">FakeM<\/a>, has been around since at least 2013.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Palo Alto&#8217;s report will likely create a stir with the attackers, who often pay attention to what security researchers write and scramble to change their methods.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">&#8220;When we publish something, we know that we&#8217;re going to burn this knowledge,&#8221; Olson said. &#8220;We want the attackers who are responsible for this to have to spend time, money and resources setting up new infrastructure and developing their code because it makes their job harder.&#8221;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The information sought would be of most interest to a nation-state, Palo Alto said in a new report<\/p>\n","protected":false},"author":3,"featured_media":2404,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"topic":[],"class_list":["post-2405","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/comments?post=2405"}],"version-history":[{"count":0,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media\/2404"}],"wp:attachment":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media?parent=2405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/categories?post=2405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/tags?post=2405"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/topic?post=2405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}