A newly designated threat group dubbed Poison Carp has been found using Android exploits to plant spyware on devices operated by the leadership of various Tibetan leaders.
The attacks were uncovered by The Citizen Lab, which found Poison Carp using a mix of eight Android browser exploits and one Android spyware kit, along with an iOS exploit chain and iOS spyware. The browser exploits were gathered from several sources, and while no zero days were involved, the cybergang did utilize unpatched malware or slightly modified versions of Chrome exploit code published on Qihoo 360’s Vulcan Team’s personal GitHub page and by a Google Project Zero member on the Chrome Bug Tracker.
“This campaign is the first documented case of one-click mobile exploits used to target Tibetan groups, and reflects an escalation in the sophistication of digital espionage threats targeting the community,” The Citizen Lab wrote.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.