A new blog post and research report from the Lookout Threat Intelligence Team has exposed the lengths to which a reputed Chinese government-sponsored APT operation has allegedly gone to track the country's Uyghur minority population, including the trojanization of mobile apps with surveillanceware.
Lookout details four spyware families -- SilkBean, DoubleAgent, CarbonSteal and GoldenEagle -- that have not previously been publicly reported (or were only minimally reported) and have been operating as far back as 2015. Moreover, the cybersecurity firm says these malware programs are connected via shared code, C2 infrastructure and signing certificates to a previously known quartet of Android surveillance tools, called HenBox, PluginPhantom, Spywaller and DarthPusher.
Lookout pins the APT activity on the reputed Chinese APT actor known as APT15, Ke3chang -- also referred to as GREF, Mirage, Vixen Panda and Playful Dragon.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.