Close Menu
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
What's Hot

Partners with PayPal, PayPal and PayPal for Chat AI Shopping

Why offensive security training benefits the entire security team

INE Security Alerts: Continuous CVE Practices Close the Important Gap Between Vulnerability Alerts and Effective Defense

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Academy
  • Events
  • Identity
  • International
  • Inventions
  • Startups
    • Sustainability
  • Tech
  • Español
    • Português
Fyself News
Home » Malware attacks target global uyghur parliament leaders via troilerized uyghuredit++ tools
Identity

Malware attacks target global uyghur parliament leaders via troilerized uyghuredit++ tools

userBy userApril 29, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

April 29, 2025Ravi LakshmananCybersecurity/Malware

In a new campaign detected in March 2025, senior members of the World Uyghur Conference (WUC) living in exile are targeted by Windows-based malware that can carry out surveillance.

The Spear-Phishing campaign included the use of a troilerized version of a legitimate open source word processing and spell checking tool called Uyghuredit++, developed to support the use of the Uyghur language.

“While there has been no particular advancement in the malware itself, malware delivery has been highly customized to reach target populations, indicating that activities related to this campaign began at least in May 2024,” the Civic Research Institute said in a report Monday.

Cybersecurity

The investigation was prompted after receiving notification from Google’s warning that the target was on the receiver of government-sponsored attacks, according to the University of Toronto-based Institute for Digital Rights Research. Some of these alerts were sent on March 5th, 2025.

The email message was a spoofing a trusted contact in the partner organization and included a Google Drive link. Click to download a password-protected RAR archive.

Residing in the archive was the addictive version of Uyghuredit++, which profiled the compromised Windows system and sent the information to an external server (“tengri.ooguy[.]com “). C++ spyware also has the ability to download additional malicious plugins for those components and execute commands.

The findings are the latest in a series of advanced target attacks targeting the Uyghur diaspora with the aim of implementing digital cross-border oppression.

Cybersecurity

Threatening actor techniques, a “deep understanding of the target community,” and suggest that the target is consistent with the Chinese government, but it is not known exactly who was behind the attack.

“China’s broad campaign of cross-border oppression targets Uyghur based on ethnic identity and activity,” the Civic Research Institute said.

“The goal of Uyghur surveillance in the diaspora is to control the relationship with their hometowns, the cross-border flow of information on the local human rights situation, and the impact on global public opinion regarding Chinese state policies in the New Jiang.”

Did you find this article interesting? Follow us on Twitter and LinkedIn to read exclusive content you post.

Source link

Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSupreme Court weighs if the Oklahoma Catholic Charter School acquires public money
Next Article Reddit supports translation of posts and comments in Hindi
user
  • Website

Related Posts

Why offensive security training benefits the entire security team

May 14, 2025

Microsoft fixed 78 flaws and exploited five zero-days. CVSS 10 bug affects Azure DevOps servers

May 14, 2025

Fortinet Patches CVE-2025-32756 Zero-Day RCE Fault exploited in Fortivoice System

May 14, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Partners with PayPal, PayPal and PayPal for Chat AI Shopping

Why offensive security training benefits the entire security team

INE Security Alerts: Continuous CVE Practices Close the Important Gap Between Vulnerability Alerts and Effective Defense

Hot Labs secures $250,000 grant from the Stellar Foundation to accelerate innovation in chain abstraction

Trending Posts

Did Pakistan shoot down five Indian fighters? What we know | India and Pakistan tension news

May 14, 2025

“I need a banana”: In a spat in Malawi Tanzania, traders are left at Limbo | Trade War News

May 14, 2025

What did India and Pakistan win and lose in military positions? | India and Pakistan tension news

May 14, 2025

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

INE Security Alerts: Continuous CVE Practices Close the Important Gap Between Vulnerability Alerts and Effective Defense

Hot Labs secures $250,000 grant from the Stellar Foundation to accelerate innovation in chain abstraction

Today’s Top Tech Startup Funding News on May 13, 2025

Lead the Digital Revolution: Secure Exclusive TwinH Country Distribution Licenses

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.