Feeds

Asian political activists whacked in Mac backdoor hack attack

What's up .doc? Oh, too late

Top 5 reasons to deploy VMware with Tegile

A security hole in Microsoft Office for Mac OS X is being exploited to hack and spy on Asian activists at odds with the Chinese government.

In the past few days, spear-phishing emails - highly targeted booby-trapped messages - were sent to Apple users in the Uyghur community, which is an ethnic group of people mostly (but not exclusively) living in Eastern and Central Asia. The community has long desired independence from Chinese rule.

The emails contained .doc files that exploit the MS09-027 vulnerability in Microsoft Office for Mac. That security hole allows miscreants to execute malicious code on the victim's unpatched machine if the document is opened.

Ironically, one of the files reports the “rise in possible state-sponsored hacking”. Others bear filenames including "Concerns over Uyghur People", "Uyghur Political Prisoner" and "Deported Uyghurs". If successful, the attack installs a backdoor on the compromised Apple Mac, allowing hackers to remotely control the computer and spy on its user's activities.

Last June, a batch of infected emails sent to Uyghur activists, and intercepted by security researchers at Kaspersky Lab, used a ZIP file containing a JPEG and a Mac OS X app that contained a Trojan. But the latest spear-phishing campaign attempts to exploit a Microsoft Office vulnerability that was fixed more than three years ago.

The latest attacks are explained in much more detail by Kaspersky Lab here and security tools firm AlienVault here.

Similar attacks have been hurled at other politically sensitive ethnic groups, such as the Tibetan people, and human-rights organisations for several years. ®

Beginner's guide to SSL certificates

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Free virtual appliance for wire data analytics
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
The total economic impact of Druva inSync
Examining the ROI enterprises may realize by implementing inSync, as they look to improve backup and recovery of endpoint data in a cost-effective manner.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.