{"id":2523,"date":"2016-03-12T00:56:32","date_gmt":"2016-03-12T00:56:32","guid":{"rendered":"https:\/\/www.iuhrdf.org\/en\/2016\/03\/12\/how-tibetans-are-fighting-back-against-chinese-hackers\/"},"modified":"2023-08-22T05:26:56","modified_gmt":"2023-08-22T05:26:56","slug":"how-tibetans-are-fighting-back-against-chinese-hackers","status":"publish","type":"post","link":"https:\/\/iuhrdf.org\/en\/how-tibetans-are-fighting-back-against-chinese-hackers\/","title":{"rendered":"How Tibetans Are Fighting Back Against Chinese Hackers"},"content":{"rendered":"<p>On September 9 of last year, a Tibetan journalist received an email with what looked like a link to a Google document about a controversial Buddhist sect.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">10 March 2016 \/\/ 08:26 PM CET<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">On September 9 of last year, a Tibetan journalist received an email with what looked like a link to a Google document about a controversial Buddhist sect.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">It could have been an interesting document, and it wasn\u2019t an attachment, something Tibetans activists and journalists&nbsp;<a href=\"http:\/\/www.huffingtonpost.com\/2014\/11\/11\/tibetan-monk-hacker-detach_n_6141188.html\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">have been specifically trained<\/a>&nbsp;to avoid. Yet the journalist found it suspicious. Instead of clicking through, the journalist immediately reported the email to a group of researchers who have been tracking cyberattacks against Tibetans for years.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The journalist\u2019s instinct not to click and instead flag the email shows that in the years-long fight between Chinese hackers and Tibetans, the embattled group is making significant strides in forcing its attackers to adapt just by being more vigilant. And it might be thanks to the work of a small nonprofit that focuses on teaching Tibetans how to protect themselves online.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Lobsang Gyatso Sither, a Tibetan living in exhile in Dharamsala, India, is at the forefront of this battle. He has been working on the ground among the Tibetan diaspora to train and educate them about cybersecurity as part of the Tibet Action Institute.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Sither said that the journalist didn\u2019t click because they had been trained to be \u201csure rather than sorry\u201d\u2014one of the main lessons of his training.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cIf you are not sure who the sender is, always assume the worst,\u201d he told Motherboard in an online chat from Dharamsala. (Sither said has saw the email in question, as well as many more similar ones, but declined to identify the journalist to protect her identity.)<\/p>\n<blockquote style=\"font-style: italic; font-family: Georgia, Times, 'Times New Roman', serif; padding: 2px 8px 2px 20px; border-style: solid; border-color: rgb(204, 204, 204); border-left-width: 5px; color: rgb(51, 51, 51); font-size: 13px; line-height: 20.8px;\">\n<h3 style=\"font-weight: normal; line-height: 1.2;\">\u201cIf you are not sure who the sender is, always assume the worst.\u201d<\/h3>\n<\/blockquote>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">As it turned out, the email was indeed an attempt to hack the journalist, a phishing attack part of a larger operation to hack into Tibetans\u2019 Google accounts, according to a new report published on Thursday by&nbsp;<a href=\"https:\/\/citizenlab.org\/\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">Citizen Lab<\/a>, a research group at the University of Toronto&#8217;s Munk School of Global Affairs.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">For years, hackers likely working for the Chinese government have been trying to gather intelligence and track down Tibetans in the diaspora as well as members of pro-Tibet human rights groups. The new report highlights yet another change in tactics in a battle that\u2019s been a constant cat-and-mouse game between the hackers and their targets. And while it\u2019s hard to tell how successful this espionage campaign has been overall, the fact that the hackers have been forced to shift tactics various times in the last few months could mean that the awareness efforts led by Sither and the Tibet Action Institute are working.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cIt\u2019s a good sign,\u201d Nathan Freitas, the director of technology at the Tibet Action Institute, told Motherboard.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The group has been raising awareness and teaching Tibetans that they themselves can be the best defense against hackers. In Late 2014 the group tried to teach Tibetans not to open attachments with a&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=v4E1SRDmtZE\" style=\"color: rgb(7, 130, 193);\">funny YouTube video<\/a>&nbsp;called \u201cdetach from attachments.\u201d Now, they are trying to emphasize the importance of avoiding outdated software with another playful video encouraging Tibetans to&nbsp;<a href=\"https:\/\/www.cybersuperhero.net\/dont-wait-update\/\" style=\"color: rgb(7, 130, 193);\">keep their computers updated<\/a>.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">While these efforts might seem basic and perhaps even cheesy, they are make cybersecurity approachable and easy to understand. And some evidence shows they might be working.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The Citizen Lab report detailed three different phishing attacks against Tibetans, and linked them to a known&nbsp;<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/01\/scarlet-mimic-years-long-espionage-targets-minority-activists\/\" style=\"color: rgb(7, 130, 193);\">hacker group<\/a>&nbsp;with likely ties with the Chinese government. These recent attacks were all designed to trick the targets into giving up the passwords of their Google accounts, according to the researchers.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Last year, in the months following the \u201cDetach from Attachments\u201d campaign, Citizen Lab showed that the hackers had started moving away from attaching documents laced with malware, and instead&nbsp;<a href=\"https:\/\/motherboard.vice.com\/read\/hackers-target-tibetans-with-malicious-google-drive-files\" style=\"color: rgb(7, 130, 193);\">started leveraging files uploaded to Google Drive<\/a>&nbsp;to trick their targets to download files and hack their computers. Now, after exposing the use of Google Drive links, it seems the hackers are again adjusting their methods trying to steal Google credentials rather than infect targets.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Phishing isn\u2019t a sophisticated hacking technique per se, but if done well, it can be effective. And if successful, it could allow hackers to infiltrate the lives of Tibetans in the diaspora and inside China, putting them and their contacts in danger.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cThe attackers\u2019 goal is to simply cause havoc and fear, and disrupt the ability of Tibetan exile groups to organize and communicate on the internet,\u201d Freitas said.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">The mere fact that these emails ended up in a report shows that at least some Tibetans have been able to avoid some cyberattacks. But these new wave of attacks shows that the hackers aren\u2019t giving up either.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cThese attackers are patient, responsive, and will adapt,\u201d Masashi Crete-Nishihata, the research manager at Citizen Lab, told me. \u201cThere is no one step that guarantees security all the time. Defense is a process.\u201d<\/p>\n<blockquote style=\"font-style: italic; font-family: Georgia, Times, 'Times New Roman', serif; padding: 2px 8px 2px 20px; border-style: solid; border-color: rgb(204, 204, 204); border-left-width: 5px; color: rgb(51, 51, 51); font-size: 13px; line-height: 20.8px;\">\n<h3 style=\"font-weight: normal; line-height: 1.2;\">\u201cThere is no one step that guarantees security all the time. Defense is a process.\u201d<\/h3>\n<\/blockquote>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">In this case, the hackers reused some of the same infrastructure from past cyberattacks against Tibetans as well as Uyghur, another minority that\u2019s been in the crosshairs of the Chinese government. This allowed Citizen Lab researchers to link the phishing attacks to a hacking group previously identified by the security firm Palo Alto Networks and dubbed&nbsp;<a href=\"http:\/\/researchcenter.paloaltonetworks.com\/2016\/01\/scarlet-mimic-years-long-espionage-targets-minority-activists\/\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">Scarlet Mimic<\/a>.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">It\u2019s unclear who is really behind the group, given its choice of targets and the infrastructure they use, all signs seem to point to China. (The Chinese embassy in Washington D.C. did not answer to a request for comment.)<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">While they\u2019ve been able to document part of this cyberespionage campaign, Citizen Lab researchers warned that the hackers are still out there, and are likely using other tactics to target Tibetans. In other words, this is just a glimpse into the larger cyberwar that\u2019s not going to stop anytime soon. Both Citizen Lab and the Tibet Action Instutute expect more to come, especially on days like March 10, which marks the anniversary of the&nbsp;<a href=\"https:\/\/en.wikipedia.org\/wiki\/Tibetan_Uprising_Day\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">1959 Tibetan uprising<\/a>, as hackers tend to latch onto current events or significant dates to craft phishing emails.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">That\u2019s why they\u2019re promoting the use of protections such as two-factor authentication, as well as a little known&nbsp;<a href=\"https:\/\/chrome.google.com\/webstore\/detail\/password-alert\/noondiphcddnnabmjcihcjfbhfklnnep?hl=en\" style=\"color: rgb(7, 130, 193);\" target=\"_blank\" rel=\"noopener\">Chrome extension<\/a>&nbsp;that alerts users when they enter their Google password in a page that doesn\u2019t belong to Google.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cThe community must remain vigilant,\u201d Citizen Lab\u2019s Crete-Nishihata said.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">Sither, who has been working at the Tibet Action Institute since 2011, has a very buddhist way of looking at this constant cat-and-mouse battle.<\/p>\n<p style=\"color: rgb(51, 51, 51); font-family: sans-serif, Arial, Verdana, 'Trebuchet MS'; font-size: 13px; line-height: 20.8px;\">\u201cThe attacks are not going to stop, but if we can increase the cost of launching these attacks,\u201d he told me. \u201cThat is a small victory.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On September 9 of last year, a Tibetan journalist received an email with what looked like a link to a Google document about a controversial Buddhist sect.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[6,197],"tags":[],"topic":[],"class_list":["post-2523","post","type-post","status-publish","format-standard","hentry","category-news","category-tibet"],"acf":[],"_links":{"self":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/comments?post=2523"}],"version-history":[{"count":1,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2523\/revisions"}],"predecessor-version":[{"id":7769,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/posts\/2523\/revisions\/7769"}],"wp:attachment":[{"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/media?parent=2523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/categories?post=2523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/tags?post=2523"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/iuhrdf.org\/en\/wp-json\/wp\/v2\/topic?post=2523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}