Researchers at Canada’s Citizen Lab have spotted a phishing campaign and supply chain attack directed at Uyghur people living outside China, and suggest it’s an example of Beijing’s attempts to target the ethnic minority group. Many Uyghur people, a Muslim ethnic majority, live in China’s Xinjiang province and according to the United Nations are subjected to “serious human rights violations” including arbitrary detention, may be forced not to use their own language, and are subject to discriminatory government policies that create “interlocking patterns of severe and undue restrictions on a wide range of human rights.” Some Uyghur people have moved abroad, and formed a group called the World Uyghur Congress (WUC) to lobby for their people’s rights.
According to Citizen Lab, “several senior members” of the Congress living outside China were sent emails that “impersonated a trusted contact at a partner organization and contained Google Drive links that, if clicked, would download a password-protected RAR archive.” That archive contained a Windows version of an open source Uyghur text editor called UyghurEditPP. Citizen Lab thinks members of the WUC know the application’s developer, who has also worked on optical character recognition software for Uyghur script and speech recognition software for the Uyghur language.
That prior relationship means recipients would likely trust the sender. That trust was misplaced: Citizen Lab alleges the version of UyghurEditPP linked to in the phishing mails was altered to include malware and “contained a backdoor that would allow the operator to gather information about the device, upload information to a command and control server, and download additional files, including other malware.” The malware also makes it possible to download files from the target device and install malware plugins.
Citizen Lab hasn’t identified the source of the phishing campaign or the supply chain attack on UyghurEditPP but notes China has used similar tactics before. The Lab also points out that China aims to suppress the Uyghur language and an attack on software designed for those who speak the tongue therefore meets Beijing’s goals. “According to a WUC member, only a few people in the diaspora have both the technical knowhow and the motivation to develop such software,” Citizen Labs researchers wrote.
“Trojanizing their projects by implanting malware causes harm beyond the immediate phishing attempt because it sows fear and uncertainty about the very tools aiming to support and preserve the community.” The Lab found a few small positives to take away from the incident, because the WUC members targeted by the phishing campaign were alerted to it by Google, weren’t fooled by it, and the attack “was not notable for its technical sophistication and did not involve zero-day exploits or mercenary spyware.” On the downside, Citizen lab wrote “delivery of the malware showed a high level of social engineering, revealing the attackers’ deep understanding of the target community.
” The outfit also worries that attack’s limited success could lead to an escalation in future aggressive campaigns. “The need to be constantly alert to the next threat is a daunting task for targeted communities,” Citizen Lab’s researchers wrote. ®.
Technology
Open source text editor poisoned with malware to target Uyghur users

Who could possibly be behind this attack on an ethnic minority China despises? Researchers at Canada’s Citizen Lab have spotted a phishing campaign and supply chain attack directed at Uyghur people living outside China, and suggest it’s an example of Beijing’s attempts to target the ethnic minority group....