Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Hackers Attack Uighurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor
Global Security

Hackers Attack Uighurs and Tibetans with MOONSHINE Exploit and DarkNimbus Backdoor

AdminBy AdminDecember 5, 2024No Comments5 Mins Read
Hackers Target Uyghurs and Tibetans
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


Hackers are targeting Uighurs and Tibetans

Duplicated previously undocumented threat cluster Land of the Minotaur uses the MOONSHINE exploit suite and an unregistered Android and Windows backdoor called DarkNimbus to facilitate long-term surveillance operations against Tibetans and Uighurs.

“Earth Minotaur uses MOONSHINE to deliver the DarkNimbus backdoor to Android and Windows devices, targeting WeChat and potentially making it a cross-platform threat,” Trend Micro researchers Joseph Chen and Daniel Lungi said in an analysis published today.

“MOONSHINE exploits many known vulnerabilities in Chromium-based browsers and applications, requiring users to regularly update their software to prevent attacks.”

Countries affected by Earth Minotaur attacks include Australia, Belgium, Canada, France, Germany, India, Italy, Japan, Nepal, Netherlands, Norway, Russia, Spain, Switzerland, Taiwan, Turkey, and the United States

Moonshine was born for the first time in September 2019 cyber attacks targeting the Tibetan community, Citizen Lab attributes their use to an operator it tracks under the pseudonym CARP POISONwhich intersects with threat groups Land of Empus and Wicked Eyes.

An Android-based exploit suite that is known to use various Chrome browser exploits to deploy payloads that can siphon sensitive data from compromised devices. In particular, it includes code for various applications such as Google Chrome, Naver, and instant messaging programs such as LINE, QQ, WeChat, and Zalo, which embed a browser within the application.

Cyber ​​security

Minotaur Earth, according to Trend Micro, has no direct connection to Empus Earth. A threat actor mainly targeting the Tibetan and Uyghur communities was found to be using an upgraded version of MOONSHINE to infiltrate victims’ devices and then infect them with DarkNimbus.

The new variant adds to the arsenal of exploits CVE-2020-6418type confusion vulnerability in the V8 JavaScript engine, which Google patched in February 2020 after reports that it was a zero-day weapon.

Hackers are targeting Uighurs and Tibetans

“Earth Minotaur sends carefully crafted messages via instant messaging programs to encourage victims to click on an embedded malicious link,” the researchers said. “They masquerade as different personas in chat rooms to increase the success of their social engineering attacks.”

The fake links lead to one of at least 55 MOONSHINE exploit servers that install the DarkNimbus backdoor on target devices.

In a clever attempt at deception, these URLs are masquerading as seemingly innocuous links, displaying ads related to China or related to online videos of Tibetan or Uyghur music and dance.

“When the victim clicks on the attack link and is redirected to the exploit server, it responds based on built-in settings,” Trend Micro said. “The server will redirect the victim to a disguised legitimate link once the attack is over so that the victim does not notice any unusual activity.”

Hackers are targeting Uighurs and Tibetans

In situations where Tencent’s Chromium-based browser is not susceptible to any of the exploits supported by MOONSHINE, the kit’s server is configured to return a phishing page that warns the WeChat user that the browser is in the program (and custom version Android WebView is called XWalk) is outdated and needs to be updated by clicking on the download link provided.

This leads to a browser engine downgrade attack that allows a threat actor to take advantage of the MOONSHINE platform by exploiting unpatched security flaws.

Cyber ​​security

A successful attack results in a trojan version of XWalk being implanted on an Android device and replacing its legitimate counterpart in the WeChat app, eventually paving the way for DarkNimbus to execute.

The backdoor is believed to have been developed and has been actively updated since 2018, uses the XMPP protocol to communicate with a server controlled by the attacker, and supports an exhaustive list of commands to convert valuable information, including device metadata, screenshots, browser bookmarks, phone call history, contacts , SMS messages, geolocation, files, clipboard contents and list of installed programs.

It is also capable of executing shell commands, recording phone calls, taking photos, and abusing Android accessibility services permissions to collect messages from DingTalk, MOMO, QQ, Skype, TalkBox, Voxer, WeChat, and WhatsApp. Last but not least, it can remove itself from the infected phone.

Trend Micro said it also discovered a version of DarkNimbus for Windows that was likely created between July and October 2019, but was only used more than a year later in December 2020.

It lacks many features of its Android variant, but includes a wide range of commands to collect system information, list of installed programs, keystrokes, clipboard data, saved credentials and history from web browsers, and to read and download file contents.

While the exact origin of Earth Minotaur is currently unclear, the variety of observed infection chains combined with highly effective malware tools leave no doubt that it is a sophisticated threat.

“MOONSHINE is a toolkit that is still under development and has been shared by many threat actors, including Earth Minotaur, POISON CARP, UNC5221and others,” Trend Micro theorizes.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025

Russian APT29 operates Gmail app passwords to get around 2FA in the target phishing campaign

June 19, 2025

Meta adds support to logy for Android and iOS users

June 19, 2025

Linux’s new drawbacks provide complete root access via PAM and Udisks in major distributions

June 19, 2025

The new malicious company uses Cloudflare tunnels to deliver rats through phishing networks

June 18, 2025

1500+ Minecraft players infected with malicious Java software

June 18, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Safe Coding Vibe: Full New Guide

June 19, 2025

Bluenoroff Deepfake Zoom AFM Hits Crypto employee with malicious MacOS software

June 19, 2025

Discover the areas hiding in trusted instruments – find out how in this free expert session

June 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.