º£½Ç´óÉñ

Digital attacks on China critics intensify, says cybersecurity firm

The group behind the so-called Scarlet Mimic malware campaign that has traditionally targeted Tibetan and Uyghur groups are using more sophisticated tools and going after new targets, according to Palo Alto Networks.

A protester across from United Nations Headquarters in New York.

Mike Segar/Reuters/File

January 25, 2016

A shadowy hacker group with suspected ties to the Chinese government has increased its attacks on human rights groups and is even targeting the Russian spy agency, according to .

The cybersecurity company Palo Alto Networks noticed a recent upswing in activity in a four-year-old malware campaign dubbed "Scarlet Mimic," a reference to the program attackers use to imitate legitimate software, designed to steal location data and sensitive communications from targeted computers.

While the attackers mostly target organizations that support the rights of Tibetan and Uyghur minorities,Ìýthe unknown group behind the campaign appears to be targetingÌýthe Russian Federal Security Service and Indian government organizations with targeted phishing attacks.

Chinese activists in US blame Beijing for relentless cyberattacks

Palo Alto doesn't have specific proof linking the attacks to elements in the Chinese government or military, but the firm says the hackers' behavior and the profiles of the victims suggest China is either officially or unofficially involved in the malware campaign.

"We do believe there is a government behind this," saysÌýRyan Olson, director of threat intelligence at Palo Alto's Unit 42 research team. "But we don’t have any evidence linking China" directly to Scarlet Mimic, he said.

Over the past year, China has been blamed for a string of massive data breaches and hacks in the US, from the Office of Personnel Management incursion to the Anthem data breach. But for years, civil society and rights groups such asÌýthe World Uyghur Congress andÌýTibetan Alliance of Chicago have complained they are under constant digital surveillance and attack from Chinese agencies.Ìý

For instance, inÌý2012, the cybersecurity firmÌýÌýdescribed how Tibetan activists – ranging from personal envoys of the Dalai Lama to students in San Francisco – were victims of near daily cyberattacks.

Mr. OlsonÌýsaid the firm is publishing data about the increase in attacks in hopes it will expose hackers' techniques and enable likely targets to effectively boost security.Ìý"Our main goal in publishing this info is to expose these attack tools and infrastructure and to make them redevelop everything."

Lesotho makes Trump’s polo shirts. He could destroy their garment industry.

In addition to targeting Windows systems, the group behind Scarlet Mimic have recently started using malware to infectÌýAndroid and Apple’s Mac OS X operating systems.Ìý

In most cases, the attackers use spear-phishing e-mails with a malicious attachment to compromise the systems of targeted individuals. People who open the attachments inadvertently download a malware tool that takes advantage of a variant of a previously known vulnerability in Windows, dubbed FakeM, to infect their systems.

One of the decoy images that Palo Alto recovered included an image comparing RussianÌýPresident Vladimir Putin to Adolf Hitler.Ìý

Ìý