The Uyghur community in China and Pakistan was the target of an ongoing espionage campaign by tricking them to download a Windows backdoor to collect sensitive information from their systems.

According to researchers from Check Point Research (CPR) and Kaspersky’s GReAT team, the campaign abused United Nations (UN) branding to target the victims. 

The targets were the Uyghurs, a Turkic ethnic minority found in Xinjiang, China and the campaign was believed to be the work of a Chinese-speaking threat actor.

The targets are sent phishing documents that are branded with the United Nations’ Human Rights Council (UNHRC) logo. The document, which has been named UgyhurApplicationList.docx, contains decoy material relating to discussions of human rights violations. 

If the victim enables editing on opening the file, VBA macro code checks the PC’s architecture and downloads either a 32- or 64-payload. 

The file dubbed “OfficeUpdate.exe,” is shellcode that fetches and loads a remote payload, but at the time of analysis, the IP was unusable. However, the domains linked to the malicious email attachment expanded the investigation further to a malicious website used for malware delivery under the guise of a fake human rights organization.

The “Turkic Culture and Heritage Foundation” (TCAHF) domain claims to work for “Tukric culture and human rights,” but the copy has been stolen from, a legitimate civil rights outfit. 

This website, directed at Uyghurs seeking funding, tries to lure visitors into downloading a “security scanner” prior to filing the information required to apply for a grant. But the software is actually a backdoor. 

The website offered a macOS and Windows version but only the link to the latter downloaded the malware. 

Two versions of the backdoor were found; WebAssistant that was served in May 2020, and TcahfUpdate which was loaded from October. The backdoors establish persistence on victim systems, conduct cyberespionage and data theft, and may be used to execute additional payloads. 

Victims are located in China and Pakistan in regions mostly populated by Uyghurs.

The post Hackers use fake foundations to target Uyghur Minority first appeared on Cybersafe News.

You May Also Like

Vodafone Portugal telecom services disrupted by a cyber attack

This morning, the Portuguese unit of telecommunications company Vodafone confirmed that a…

FBI arrests the “King of stock market”, a famous hacker in underground markets

U.S. authorities have announced the extradition of Vladislav Klyushin, an executive allegedly…

Hackers are mailing ransomware-infected USB devices to employees of hundreds of companies to take control of their networks

In its latest alert, the Federal Bureau of Investigation (FBI) mentions that…

How hackers cashed out ATMs across Europe. Europol investigation in ATM JACKPOTING case

In a press release, Europol announced the arrest of two Belarusian citizens…