China Is Forcing Tourists to Install Text-Stealing Malware at its Border
Comment of the Day

July 08 2019

Commentary by Eoin Treacy

China Is Forcing Tourists to Install Text-Stealing Malware at its Border

This article from vice.com maybe of interest to subscribers. Here is a section:

Together with the Guardian and the New York Times, the reporting team commissioned several technical analyses of the app. Penetration testing firm Cure53 on behalf of the Open Technology Fund, researchers at Citizen Lab from the University of Toronto, and researchers from the Ruhr University Bochum as well as the Guardian itself all provided insights about BXAQ. The app's code also includes names such as "CellHunter" and "MobileHunter."

Once installed on an Android phone, by "side-loading" its installation and requesting certain permissions rather than downloading it from the Google Play Store, BXAQ collects all of the phone's calendar entries, phone contacts, call logs, and text messages and uploads them to a server, according to expert analysis. The malware also scans the phone to see which apps are installed, and extracts the subject’s usernames for some installed apps. (Update: after the publication of this piece, multiple antivirus firms updated their products to flag the app as malware).

Eoin Treacy's view

Xinjiang is one of China’s buffer states which separates the heartland from its neighbours. It is also an energy producer and bread basket so China has additional reasons to quell even a whiff of separatist sentiment. The extend of surveillance and re-education programs (incarceration) is unparalleled in modern history and is a testament to just how overtly authoritarian the administration is.

Click HERE to subscribe to Fuller Treacy Money Back to top