Tuesday, November 12, 2024
HomeHacksFacebook Blocks Chinese Hackers Using Fake Person as Targeting Uyghur Activists

Facebook Blocks Chinese Hackers Using Fake Person as Targeting Uyghur Activists

Published on

Malware protection

The security experts and analysts from Facebook threat intelligence team has recently worked together to detect and stop a huge range of threat.

The threat that is being detected is known as “Earth Empusa” or “Evil Eye” in the industry of security. However, this threat includes cyber-espionage campaigns, influence operations, and much more.

Not only this, as the threat actors of this recent flaw, nation-state actors and many other groups are continuously hacking and exploiting Facebook’s platform.

- Advertisement - SIEM as a Service

The analysts have asserted that this is not the first time when hackers have been arrested for such activity. The news got spread all over the internet, and the social media company affirmed that the hacker had targeted the activists, dissidents, and journalists who were predominantly Uighurs.

Uighurs are a largely Muslim ethnic group that is continuously facing persecution in China; however, Uighurs belong from the north-western region of Xinjiang in China.

The ones who got targeted are currently abiding in places that include Turkey, the United States, Australia, and Canada.

TTPs Used by the Threat Actors

Here are the TTPs that are used by the hackers in this threat are mentioned below:-

  • Selective targeting and exploit protection
  • Negotiating and representing news websites
  • Social engineering
  • Using fraudulent third-party app stores
  • Outsourcing malware development
  • Industry tracking

Moreover, the western government is continuously trying to hold Beijing accountable for the mass detainments of all Muslim Uighurs. After all the claims, China simply denied all the accusations of abuse. 

China also proclaimed that it had executed different camps, and all these camps implement vocational training and are required to fight extremism. Not only this, but according to the report, nearly 1 million people, and the majority of people belong to Uighurs, have been arrested in the Xinjiang camps.

Moreover, after a proper investigation, the report came, and it states that China is facing criticism from all over the world because of the way they have treated the mostly Muslim Uighur community in Xinjiang.

Not only the cybersecurity experts but the rights groups also consider that China has restrained more than a million Uighurs over the past few years.

Facebook declared that this hacking group has used fake accounts to pretend as fictitious journalists, students, rights advocates, or Uighurs so that they can build trust with their targets and can easily deceive them into clicking all the malicious links.

Apart from all these things, Facebook has also discovered a website that was generally performed by the group to simulate the third-party Android app stores along with Uighur-themed apps, such as prayer app, that contain the malware.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity, and hacking news updates.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Dell Enterprise SONiC Flaw Let Attackers Hijack the System

Dell Technologies has disclosed multiple critical security vulnerabilities in its Enterprise SONiC OS, which...

Amazon Confirms Employee Data Breach Via Third-party Vendor

Amazon has confirmed that sensitive employee data was exposed due to a breach at...

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Telegram Bot Selling Phishing Tools to Bypass 2FA & Hack Microsoft 365 Accounts

A newly discovered phishing marketplace, ONNX Store, empowers cybercriminals to launch sophisticated attacks against...

Mobile Device Management Vendor Mobile Guardian Hacked

 Mobile Guardian, a leading Mobile Device Management (MDM) vendor, experienced unauthorized access to its...

Hunt3r Kill3rs Group claims they Infiltrated Schneider Electric Systems in Germany

The notorious cybercriminal group Hunt3r Kill3rs has claimed responsibility for infiltrating Schneider Electric's systems...