View difference between Paste ID: YncfELix and 7zp79DH6
SHOW: | | - or go back to the newest paste.
1
### China-Specific Threats
2
3
#### Malware
4
- **DaVinci (RCSAndroid)**: Android malware targeting Chinese dissidents (Discovered: 2015) - Likely developed by Qihoo 360.
5
- **HenBox**: Android malware targeting Uighurs and Tibetans (Discovered: 2018).
6
- **SilkBean**: Android malware used against Tibetans (Discovered: 2013).
7
- **GoldenEagle**: Android malware used against Tibetans (Discovered: 2015).
8
- **WUC's Mobile Malware**: Android malware used against Tibetans (Discovered: 2018).
9
- **PlugX**: Android malware used in targeted attacks (Discovered: 2015).
10
- **DoubleAgent**: Android malware used for espionage (Discovered: 2017) - Likely developed by Qihoo 360.
11
- **RedDelta**: Android malware targeting religious minorities (Discovered: 2020).
12
- **Poison Carp**: iOS malware used against Tibetans (Discovered: 2019).
13
- **Zitmo**: Android malware targeting activists (Discovered: 2011).
14
- **Gh0st RAT**: Versatile RAT often used in cyber espionage (Discovered: 2009, mobile variants: N/A).
15
16
#### Exploits
17
- **CVE-2019-2215**: Exploit used by China-linked APT for rooting Android devices (Discovered: 2019).
18
- **CVE-2020-1805**: Huawei Android exploit (Discovered: 2020) - Developed by Huawei.
19
- **CVE-2018-8232**: Exploit affecting Windows Mobile, attributed to Chinese APTs (Discovered: 2018).
20
21
#### Government or Intelligence Tools
22
- **Great Firewall**: Internet regulation and surveillance tool, with mobile capabilities (Implemented: 2003).
23
- **Great Cannon**: DDoS tool used to target foreign websites and potentially mobile services (Discovered: 2015).
24
- **Golden Shield**: Security and surveillance project with mobile monitoring (Implemented: Early 2000s).
25
- **SkyNet**: Real-time surveillance system intercepting SMS and calls (Publicly Disclosed: 2015).
26
- **Fang Binxing's System**: Rumored to have mobile surveillance capabilities (Implemented: Unknown).
27
- **DragonNet**: Intrusion and surveillance network (Discovered: 2019).
28
- **Dancing Panda**: Cyber espionage operation targeting various platforms, including mobile (Discovered: 2014).
29
- **OceanBuffalo**: Suspected China-linked APT with a sophisticated espionage infrastructure, includes mobile targets (Discovered: 2018).
30
- **Tianwang**: System for monitoring mobile communications for flagged keywords (Implemented: 2013).
31
- **Elderwood Project**: Set of zero-day exploits and tools targeting mobile devices (Discovered: 2012).
32
- **SharpPanda**: APT group using spear phishing to target mobile devices (Discovered: 2021).
33
- **Iron Tiger**: APT group focusing on data theft from mobile devices (Discovered: 2015).
34
- **APT10 (MenuPass Group)**: Branching out into mobile exploitation (Discovered: 2009, mobile activities: recent years).
35
- **Winnti Group**: Known for cyber-espionage, targeted mobile platforms in recent years (Discovered: 2011, mobile activities: N/A).
36
- **Emissary Panda (APT27)**: Highly targeted spear phishing campaigns focusing on mobile targets (Discovered: 2010).
37
38
#### Companies Developing Exploits/Malware
39
- **Qihoo 360**: Known for security products and likely for discovering exploits like DaVinci (RCSAndroid) and DoubleAgent (Founded: 2005).
40
- **Huawei**: Suspected of building backdoors into its mobile devices, and responsible for CVE-2020-1805 (Founded: 1987).
41
- **Xiaomi**: Also suspected of having backdoors in its phones (Founded: 2010).
42
- **Keen Team**: A well-known Chinese hacking team that has created various exploits for mobile platforms (Founded: N/A).
43
44
#### Tools for Delivery
45
- **OceanBuffalo**: Suspected China-linked APT that delivers malware through watering hole attacks on mobile websites (Discovered: 2018).
46
- **Spring Dragon**: Deploys a wide variety of custom malware and exploits (Discovered: 2017).
47
- **SharpPanda**: Chinese APT known for spear phishing attacks, including mobile targets (Discovered: 2021).
48
- **Emissary Panda (APT27)**: Known for its highly targeted spear phishing campaigns, including mobile targets (Discovered: 2010).
49
- **GREF Team**: Known for distributing Gh0st RAT and other malware via spear phishing and watering hole attacks.