That indiscriminate web-based hacking campaign is remarkable not just because it occurred during the peak of China's novel coronavirus crisis, but also because it began just months after Volexity and Google publicly revealed that the same Evil Eye group was hacking smartphones via those same websites, using a rare collection of previously unknown iOS software vulnerabilities —also known as zero-day vulnerabilities —that shocked the cybersecurity world. The security research group Citizen Lab found that the same zero-day vulnerabilities were also being used to target Tibetan victims, which Volexity sees as a suggestion that the hackers were likely carrying out domestic surveillance on behalf of the Chinese government. The country has faced international criticism over its treatment of both ethnic groups, with a growing focus in recent years on the reported suppression of Uighurs in the Xinjiang region of Western China.
The fact that the hackers so quickly retooled and launched a new spy campaign in late 2019 and early 2020 seems to suggest just how determined China's state-sponsored hackers are to keep tabs on Uighurs' communications, says Volexity founder Steven Adair. "To put this many resources and effort into developing implants and exploits clearly shows that Uighurs are a high priority target," says Adair, using the term "exploit" to refer to a hacking technique and "implant" to mean the malware it installs on a target machine. "They’re up there enough that, even in the time of coronavirus and even after this group was publicly outed and exposed, it didn't deter them from continuing to operate."
Related StoriesReturn to SenderMIT Cuts Ties With Chinese AI Firm Amid Human Rights Concerns
State-Sponsored Hackers Are Ramping Up Coronavirus Attacks
This Map Shows the Global Spread of Zero-Day HackingLast fall, Google’s Project Zero research team revealed that a group of hackers had used no fewer than 14 zero-day vulnerabilities in web-based watering hole attacks, which Volexity subsequently tied to an ongoing hacking campaign targeting Chinese Uighurs. The more recent attacks, by contrast, didn't use any zero-day vulnerabilities, but instead targeted phones missing the most recent iOS patches previous to July of 2019, including iOS versions 12.3, 12.3.1, and 12.3.2. (In separate news, security firm ZecOps today revealed that a zero-day hacking technique had been used against iPhones in the wild, and only patched in a beta update for iOS last week. Update your iPhone to protect against both attacks.)
According to Volexity, the hackers used vulnerabilities in Webkit, which serves as the foundation of iOS browsers, to hack website visitors with malicious iframes planted on the targeted sites. Volexity's Adair says the exploit would have been almost impossible for a user to detect, and didn't discriminate among victims, simply infecting every visitor to compromised sites. "For someone on the phone, there’s zero indication this happened," Adair says. "They just cast the widest net, pulled in the catch, and then went through the results."
On Monday, US secretary of state Mike Pompeo scolded China for using civilian polar research to further its military and commercial goals, including opening up a new “Polar Silk Road” for trade and shipping. Yun says Chinese scientists don’t see the conflict between scientific research and national goals of resource development.