Friday, November 15, 2024
HomeHacksFacebook Blocks Chinese Hackers Using Fake Person as Targeting Uyghur Activists

Facebook Blocks Chinese Hackers Using Fake Person as Targeting Uyghur Activists

Published on

The security experts and analysts from Facebook threat intelligence team has recently worked together to detect and stop a huge range of threat.

The threat that is being detected is known as “Earth Empusa” or “Evil Eye” in the industry of security. However, this threat includes cyber-espionage campaigns, influence operations, and much more.

Not only this, as the threat actors of this recent flaw, nation-state actors and many other groups are continuously hacking and exploiting Facebook’s platform.

- Advertisement - SIEM as a Service

The analysts have asserted that this is not the first time when hackers have been arrested for such activity. The news got spread all over the internet, and the social media company affirmed that the hacker had targeted the activists, dissidents, and journalists who were predominantly Uighurs.

Uighurs are a largely Muslim ethnic group that is continuously facing persecution in China; however, Uighurs belong from the north-western region of Xinjiang in China.

The ones who got targeted are currently abiding in places that include Turkey, the United States, Australia, and Canada.

TTPs Used by the Threat Actors

Here are the TTPs that are used by the hackers in this threat are mentioned below:-

  • Selective targeting and exploit protection
  • Negotiating and representing news websites
  • Social engineering
  • Using fraudulent third-party app stores
  • Outsourcing malware development
  • Industry tracking

Moreover, the western government is continuously trying to hold Beijing accountable for the mass detainments of all Muslim Uighurs. After all the claims, China simply denied all the accusations of abuse. 

China also proclaimed that it had executed different camps, and all these camps implement vocational training and are required to fight extremism. Not only this, but according to the report, nearly 1 million people, and the majority of people belong to Uighurs, have been arrested in the Xinjiang camps.

Moreover, after a proper investigation, the report came, and it states that China is facing criticism from all over the world because of the way they have treated the mostly Muslim Uighur community in Xinjiang.

Not only the cybersecurity experts but the rights groups also consider that China has restrained more than a million Uighurs over the past few years.

Facebook declared that this hacking group has used fake accounts to pretend as fictitious journalists, students, rights advocates, or Uighurs so that they can build trust with their targets and can easily deceive them into clicking all the malicious links.

Apart from all these things, Facebook has also discovered a website that was generally performed by the group to simulate the third-party Android app stores along with Uighur-themed apps, such as prayer app, that contain the malware.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Google Unveils New Intelligent, Real-Time Protections for Android Users

Google has once again raised the bar for mobile security by introducing two new...

Chinese National Faces 20 Years of Jail Time for Laundering Millions in Crypto

Daren Li, 41, a dual citizen of China and St. Kitts and Nevis, and...

Google to Issue CVEs for Critical Cloud Vulnerabilities

Google Cloud has announced a significant step forward in its commitment to transparency and...

GitLab Patches Critical Flaws Leads to Unauthorized Access to Kubernetes Cluster

GitLab has rolled out critical security updates to address multiple vulnerabilities in its Community...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...