Article Details
Scrape Timestamp (UTC): 2025-04-29 03:17:40.130
Source: https://www.theregister.com/2025/04/29/citizen_lab_uyghur_phishing_malware/
Original Article Text
Click to Toggle View
Open source text editor poisoned with malware to target Uyghur users. Whoever could be behind this attack on an ethnic minority China despises?. Researchers at Canada’s Citizen Lab have spotted a phishing campaign and supply chain attack directed at Uyghur people living outside China, and suggest it’s an example of Beijing’s attempts to target the ethnic minority group. Many Uyghur people, a Muslim ethnic majority, live in China’s Xinjiang province and according to the United Nations are subjected to “serious human rights violations” including arbitrary detention, may be forced not to use their own language, and are subject to discriminatory government policies that create “interlocking patterns of severe and undue restrictions on a wide range of human rights.” Some Uyghur people have moved abroad, and formed a group called the World Uyghur Congress (WUC) to lobby for their people’s rights. According to Citizen Lab, “several senior members” of the Congress living outside China were sent emails that “impersonated a trusted contact at a partner organization and contained Google Drive links that, if clicked, would download a password-protected RAR archive.” That archive contained a Windows version of an open source Uyghur text editor called UyghurEditPP. Citizen Lab thinks members of the WUC know the application’s developer, who has also worked on optical character recognition software for Uyghur script and speech recognition software for the Uyghur language. That prior relationship means recipients would likely trust the sender. That trust was misplaced: Citizen Lab alleges the version of UyghurEditPP linked to in the phishing mails was altered to include malware and “contained a backdoor that would allow the operator to gather information about the device, upload information to a command and control server, and download additional files, including other malware.” The malware also makes it possible to download files from the target device and install malware plugins. Citizen Lab hasn’t identified the source of the phishing campaign or the supply chain attack on UyghurEditPP but notes China has used similar tactics before. The Lab also points out that China aims to suppress the Uyghur language and an attack on software designed for those who speak the tongue therefore meets Beijing’s goals. “According to a WUC member, only a few people in the diaspora have both the technical knowhow and the motivation to develop such software,” Citizen Labs researchers wrote. “Trojanizing their projects by implanting malware causes harm beyond the immediate phishing attempt because it sows fear and uncertainty about the very tools aiming to support and preserve the community.” The Lab found a few small positives to take away from the incident, because the WUC members targeted by the phishing campaign were alerted to it by Google, weren’t fooled by it, and the attack “was not notable for its technical sophistication and did not involve zero-day exploits or mercenary spyware.” On the downside, Citizen lab wrote “delivery of the malware showed a high level of social engineering, revealing the attackers’ deep understanding of the target community.” The outfit also worries that attack’s limited success could lead to an escalation in future aggressive campaigns. “The need to be constantly alert to the next threat is a daunting task for targeted communities,” Citizen Lab’s researchers wrote.
Daily Brief Summary
Researchers at Citizen Lab discovered a phishing campaign and supply chain attack aimed at the Uyghur diaspora, likely instigated by Beijing.
The attack involved emails that appeared to be from trusted sources, offering links to download a compromised Uyghur text editor, UyghurEditPP.
This malware-infected program included capabilities for remote access, information upload to a server, and the installation of additional malicious files.
The targeting of Uyghur language software fits into broader patterns of cultural suppression and human rights violations by Chinese authorities against the Uyghur minority.
Despite the high level of social engineering involved in the attack, affected members of the World Uyghur Congress (WUC) were forewarned by Google and did not fall for the trap.
The failed phishing attempt highlights the need for constant vigilance by targeted communities against future, potentially more sophisticated threats.
Citizen Lab's report underscores ongoing concerns about the safety and security of software developed within persecuted or high-risk groups.