Intelligence agencies globally spy on their citizens often under the pretext of “security reasons.” While this hasn’t been well received in Western countries, others remain a different case. China on the other end is a different ball game.
Last year, Hackread.com reported that the Chinese government is utilizing facial recognition databases for probably months to remotely monitor the Uyghur populace in the Xinjiang region. Now, in a research report released by Volexity – a cybersecurity firm – it has revealed the existence of an iOS vulnerability being exploited to spy on the Uyghurs minority in China.
See: “BreedReady” database of 1.8m Chinese women surfaced online
Dubbed as Insomnia by researchers; the iOS vulnerability is believed to have been at its maximum usage from January to March 2020 working on iOS versions 12.3, 12.3.1, and 12.3.2 whereas Apple patched the vulnerability in 12.4 in July 2019.
It is worth noting that according to researchers, the group is this campaign is called Evil Eye while the vulnerability itself is exploited to carry out the Waterholing, an attack quite popular among Chinese hackers and previously used in cyberattacks against national data center of an unknown Central Asian country.
Watering holes is a technique in which famous websites are infected with malware so that visitors unknowingly get their devices infected.
As for the ongoing campaign, the potential impact of it is huge since 43% of iPads and 30% of iPhones are reported to be using iOS 12 or earlier according to Apple itself.
Coming to the data stolen through this attack, it includes GPS coordinates, contact numbers, emails from Gmail and Protonmail, photos from the iPhone photos app, messages from numerous messenger platforms such as Whatsapp, Telegram, WeChat, iMessage, Hangouts and even those photos sent through the highly secure Signal app.
How it works is by basically loading the malware initially on Uyghur themed websites that have been compromised. The loading methods include but are not limited to the use of iframes and modified JavaScript files.
An example of the code found on one website which loaded it through an iframe was as follows:
5tZS9pbmRleC5odG1sIj48L2lmcmFtZT48L2JvZHk+PC9oZWFkPjwvaHRtbD4=”>
