Skip to main content

Tibet

Malware identified as latest OS X trojan targeting Tibetan activists

posted onNovember 15, 2012
by l33tdawg

A new variant of Mac malware Imuler has been identified targeting Tibetan activists. The discovery was made by Bellevue, Wash.-based Apple platform security vendor Intego Inc.

According to a blog post by Lysa Myers, a virus hunter at Intego, the malware has been identified as OSX/Imuler.E, and shows many similarities to OSX/Imuler.D, which also targeted Tibetan activists.

Tibet Trojan attacks connected to Chinese programmer

posted onSeptember 17, 2012
by l33tdawg

Security firm AlienVault thinks it has identified a key Chinese programmer with connections to the Chinese Government who could be behind a long-running malware assault on pro-Tibet campaigners, including with the recent PlugX RAT Trojan.

It’s extremely rare that security companies are able to put a name and a face to specific pieces of malware so the connection it stumbled upon when researching PlugX could attract some attention.

Chinese hackers from Tecncent apparently attack Indian and Tibetan websites

posted onApril 2, 2012
by l33tdawg

Trend Micro is reporting that websites of Indian government and Tibetan activists in India were attacked in a cyber attack campaign by a Chinese hacker, working with one of the world's largest online retailers Tencent. 

Known as the Luckycat cyber campaign, about 90 attacks were detected in recent past, against targets in India and Japan, as also Tibetan activists, according to the report released Trend. 

Targeted malware intended for Tibet Administration intercepted by researchers

posted onMarch 19, 2012
by l33tdawg
Researchers from Alien Vault have recently detected several targeted attacks against Tibetan activist organizations including the Central Tibet Administration and International Campaign for Tibet. They believe these attacks originate from the same group of Chinese hackers that launched the ‘Nitro’ attacks against chemical and defense companies late last year and are aimed at both spying on and stealing sensitive information about these organizations’ activities and supporters.