Subscribe / Unsubscribe Enewsletters | Login | Register

Pencil Banner

Android messaging malware targets Tibetan activists

Jeremy Kirk | April 2, 2013
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.

Citizen Lab tested the tampered version of KaKaoTalk against three mobile antivirus scanners made by Lookout Mobile Security, Avast and Kaspersky Lab on Feb. 6 and March 27. None of the products detected the malware.

Citizen Lab wrote that the finding shows those who are targeting the Tibetan community quickly change their tactics.

As soon as discussions began to move away from WeChat, the attackers "leveraged this change, duplicating a legitimate message and producing a malicious version of an application being circulated as a possible alternative," Citizen Lab wrote.

 

Previous Page  1  2 

Sign up for CIO Asia eNewsletters.