Home / Voices From The Community / A Spectrum of Threat /One Click Away From Compromise
The sophistication of social engineering used to lure targets to install mobile malware and the technical sophistication of the malware itself has significantly escalated in recent years.
Between November 2018 and May 2019, senior members of key Tibetan groups received malicious links in individually tailored WhatsApp text messages made to appear to be from NGO workers, journalists, and other fake personas. The links led to code designed to exploit web browser vulnerabilities to install spyware on iOS and Android devices. This kind of threat is called a “one click exploit”, because all it takes is one click of a link for a target to be compromised. This espionage campaign is one of the most sophisticated we have observed in the community over the last decade.
Among the targets of this campaign was Namgyal Dolkar, a Tibetan parliamentarian. On the night of November 12, 2018, she received a WhatsApp message from “Jason Wu” who claimed to be the head of the Refugee Group at Amnesty International’s Hong Kong branch. Namgyal Dolkar often receives unsolicited messages from human rights organizations seeking her assistance so this message did not seem out of the ordinary. She replied to “Jason” who proceeded to describe a recent self-immolation in Tibet, asked her to help verify the incident for an upcoming Amnesty International report on human rights in China, and sent a link. Namgyal Dolkar forwarded the message to TibCERT who in collaboration with researchers at the Citizen Lab discovered the link connected to exploits designed to infect iPhone and Android devices with malware.24
Amnesty International does not employ anyone named Jason Wu. The message was very carefully crafted to trick Namgyal Dolkar into clicking the link, which would infect her phone with malware. For Namgyal Dolkar, the real sender of the message was clear. She firmly suspects China behind the campaign as China has long persecuted the Tibetan freedom movement in exile.
In total, we found 17 high profile members of the Tibetan community who were targeted by the same campaign including members of the Offices of His Holiness the Dalai Lama, the Central Tibet Administration, Tibetan Parliamentarians and Tibetan human rights groups. This campaign was highly organized and targeted with multiple fake personas used. In every case the fake persona engaged the target in a conversation and once an exchange had started would send a malicious link. All it would take is one click of the link for the target’s phone to be turned into a spy in their pocket.