Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Attack malicious programs aimed at the world leaders of Congress Uighur through the Trojonized Uyghured ++ tool
Global Security

Attack malicious programs aimed at the world leaders of Congress Uighur through the Trojonized Uyghured ++ tool

AdminBy AdminApril 29, 2025No Comments2 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


April 29, 2025Red LakshmananCybersecurity / malicious software

In the new company, expressed in March 2025, senior members of the Uighur World Congress (WUC), who live in exile, were aimed at malicious Windows -based software.

Company-finish Uyghured ++ Designed to support Uighur’s use.

“Although the malicious software itself was not particularly advanced, the delivery of malware was extremely well established to achieve the target population and technical artifacts that show that the activity related to this company – Note In the report on Monday.

Cybersecurity

The investigation, according to the digital law research laboratory, was proposed after receiving the goals Notifications from Google Attention that their accounts were at the end of the attacks supported by the government. Some of these alerts were sent on March 5, 2025.

In the email reports, they made a trusted contact in the affiliate organization and contained links to Google Drive, which when pressed would load the RAR archive, protected by password.

The archive featured a poisoned version of the Uyghured ++, which profiled the broken Windows system and sent information to the external server (“Tengri.ooguy (.) Com”). Spin -software C ++ also comes with the capabilities to download additional malicious plugins and launch commands against these components.

The conclusions are last in A series High -cent attacks aimed at Uighur diaspora for the purpose of digital multinational repression.

Cybersecurity

It is not quite known who is behind the attacks, although the methods of threatening actors, their “deep understanding of the target community”, and targeting suggests that they are in line with the Chinese government.

“Chinese A wide company Transnational repressions are focused on Uighurs as on the basis of their ethnic identity and activity, ”the civil laboratories said.

“The purpose of observing Uighurs in the diaspora-contracting its ties with the Motherland and the cross-border flow of information about the human rights situation in the region, as well as any influence on global public opinion on the Chinese state’s politics in Xinjiang.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025

CISCO’s critical vulnerability in uniform grants on root access to static credentials

July 3, 2025

North Korean Hackers Target Web3 with malicious NIM software and use Clickfix in Babyshark

July 2, 2025

Hackers using PDFs to get yourself for Microsoft, Docusign and more in phishing campaigns return call

July 2, 2025

This network traffic looks legal but it can hide a serious threat

July 2, 2025

US Sanctions of Russia

July 2, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Massive Android fraud operations are detected: iconade, kaleidoscope, malicious SMS software, NFC scams

July 3, 2025

Chinese hackers operate Ivanti CSA Zero-Days in attacks on the French government, telecommunications

July 3, 2025

More than 40 malicious Firefox extensions target cryptocurrency wallets, steel assets

July 3, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.