SHOW:
|
|
- or go back to the newest paste.
1 | ### China-Specific Threats | |
2 | ||
3 | #### Malware | |
4 | - **DaVinci (RCSAndroid)**: Android malware targeting Chinese dissidents (Discovered: 2015) - Likely developed by Qihoo 360. | |
5 | - **HenBox**: Android malware targeting Uighurs and Tibetans (Discovered: 2018). | |
6 | - **SilkBean**: Android malware used against Tibetans (Discovered: 2013). | |
7 | - **GoldenEagle**: Android malware used against Tibetans (Discovered: 2015). | |
8 | - **WUC's Mobile Malware**: Android malware used against Tibetans (Discovered: 2018). | |
9 | - **PlugX**: Android malware used in targeted attacks (Discovered: 2015). | |
10 | - **DoubleAgent**: Android malware used for espionage (Discovered: 2017) - Likely developed by Qihoo 360. | |
11 | - **RedDelta**: Android malware targeting religious minorities (Discovered: 2020). | |
12 | - **Poison Carp**: iOS malware used against Tibetans (Discovered: 2019). | |
13 | - **Zitmo**: Android malware targeting activists (Discovered: 2011). | |
14 | - **Gh0st RAT**: Versatile RAT often used in cyber espionage (Discovered: 2009, mobile variants: N/A). | |
15 | ||
16 | #### Exploits | |
17 | - **CVE-2019-2215**: Exploit used by China-linked APT for rooting Android devices (Discovered: 2019). | |
18 | - **CVE-2020-1805**: Huawei Android exploit (Discovered: 2020) - Developed by Huawei. | |
19 | - **CVE-2018-8232**: Exploit affecting Windows Mobile, attributed to Chinese APTs (Discovered: 2018). | |
20 | ||
21 | #### Government or Intelligence Tools | |
22 | - **Great Firewall**: Internet regulation and surveillance tool, with mobile capabilities (Implemented: 2003). | |
23 | - **Great Cannon**: DDoS tool used to target foreign websites and potentially mobile services (Discovered: 2015). | |
24 | - **Golden Shield**: Security and surveillance project with mobile monitoring (Implemented: Early 2000s). | |
25 | - **SkyNet**: Real-time surveillance system intercepting SMS and calls (Publicly Disclosed: 2015). | |
26 | - **Fang Binxing's System**: Rumored to have mobile surveillance capabilities (Implemented: Unknown). | |
27 | - **DragonNet**: Intrusion and surveillance network (Discovered: 2019). | |
28 | - **Dancing Panda**: Cyber espionage operation targeting various platforms, including mobile (Discovered: 2014). | |
29 | - **OceanBuffalo**: Suspected China-linked APT with a sophisticated espionage infrastructure, includes mobile targets (Discovered: 2018). | |
30 | - **Tianwang**: System for monitoring mobile communications for flagged keywords (Implemented: 2013). | |
31 | - **Elderwood Project**: Set of zero-day exploits and tools targeting mobile devices (Discovered: 2012). | |
32 | - **SharpPanda**: APT group using spear phishing to target mobile devices (Discovered: 2021). | |
33 | - **Iron Tiger**: APT group focusing on data theft from mobile devices (Discovered: 2015). | |
34 | - **APT10 (MenuPass Group)**: Branching out into mobile exploitation (Discovered: 2009, mobile activities: recent years). | |
35 | - **Winnti Group**: Known for cyber-espionage, targeted mobile platforms in recent years (Discovered: 2011, mobile activities: N/A). | |
36 | - **Emissary Panda (APT27)**: Highly targeted spear phishing campaigns focusing on mobile targets (Discovered: 2010). | |
37 | ||
38 | #### Companies Developing Exploits/Malware | |
39 | - **Qihoo 360**: Known for security products and likely for discovering exploits like DaVinci (RCSAndroid) and DoubleAgent (Founded: 2005). | |
40 | - **Huawei**: Suspected of building backdoors into its mobile devices, and responsible for CVE-2020-1805 (Founded: 1987). | |
41 | - **Xiaomi**: Also suspected of having backdoors in its phones (Founded: 2010). | |
42 | - **Keen Team**: A well-known Chinese hacking team that has created various exploits for mobile platforms (Founded: N/A). | |
43 | ||
44 | #### Tools for Delivery | |
45 | - **OceanBuffalo**: Suspected China-linked APT that delivers malware through watering hole attacks on mobile websites (Discovered: 2018). | |
46 | - **Spring Dragon**: Deploys a wide variety of custom malware and exploits (Discovered: 2017). | |
47 | - **SharpPanda**: Chinese APT known for spear phishing attacks, including mobile targets (Discovered: 2021). | |
48 | - **Emissary Panda (APT27)**: Known for its highly targeted spear phishing campaigns, including mobile targets (Discovered: 2010). | |
49 | - **GREF Team**: Known for distributing Gh0st RAT and other malware via spear phishing and watering hole attacks. |