Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

NCSC issues warning over Chinese Moonshine and BadBazaar spyware | Computer Weekly

By Computer Weekly by By Computer Weekly
April 9, 2025
Home Uncategorized
Share on FacebookShare on Twitter


The UK’s National Cyber Security Centre (NCSC), the US’s National Security Agency (NSA) and the FBI, alongside Five Eyes partner agencies from Australia, Canada and New Zealand, and the German cyber authorities, have issued a series of advisories warning individuals at risk of hostile state surveillance to be alert to two spyware variants, dubbed Moonshine and BadBazaar.

So far, the malicious applications have been detected on the mobile devices of individuals considered to be of interest to the Chinese intelligence services. For now, their known victim profile appears to be limited to people associated with the Taiwanese, Tibetan and Uyghur Muslim communities, and other groups such as the Falun Gong movement.

However, given the scope of Beijing’s cyber espionage operations, they could easily be used against targets located in the West, conceivably including members of the Hong Kong diaspora and pro-democracy activists in the UK.

Moonshine and BadBazaar both employ a technique known as trojanising, whereby they hide their malicious functionality inside apparently legitimate applications, to access device functions such as microphones and cameras, location data, messages and photos.

“With our international and industry partners, we are committed to helping equip individuals at risk of online surveillance with the information they need to counter spyware threats,” said NCSC operations director Paul Chichester.

The NCSC urges people at higher risk to exercise heightened vigilance and follow our practical advice to help keep their devices and data safe
Paul Chichester, NCSC

“We are seeing a rise in digital threats designed to silence, monitor and intimidate communities across borders, and the use of these two forms of spyware is clearly unacceptable.

“The NCSC urges people at higher risk to exercise heightened vigilance and follow our practical advice outlined in the advisory to help keep their devices and data safe,” added Chichester.

Skype and WhatsApp both targeted

Among the trojanised apps discovered by the Five Eyes agencies are compromised instances of Microsoft’s soon-to-be-discontinued Skype and Meta’s WhatsApp messaging services.

However, both Moonshine and BadBazaar have also been observed hiding within apps that the threat actor behind the spying campaign appears to have designed to lure in victims.

Among them is an application called TibetOne, an iOS app designed to support language learning that has the ability to access device information and location data. The app was uploaded to the App Store as long ago as December 2021, but is no longer available.

A second app identified, Audio Quran.apk, was used specifically to target members of the Uyghur Muslim community located in China’s remote western Xinjiang region with Moonshine. The Turkic Uyghurs have been subject to repression by the Chinese authorities, which has been described as genocide by the Americans. Like TibetOne, Audio Quran collected a wealth of information from its victims.

New advice

Besides the two new advisories – one containing guidance for potential victims, the other a technical breakdown of each spyware, including advice for app store operators, developers and social media companies – the NCSC has also shared four key steps that all individuals, regardless of their risk profile, should be taking to safeguard their devices.

  1. Stay mainstream: Refrain from trying to jailbreak or root devices and only download applications from trusted app stores.
  2. Stay organised: Audit your installed apps, and their permissions, on a regular basis.
  3. Stay in touch: Report suspicious messages or files.
  4. Stay safe: Be cautious on social media, and check and review shared files or links for malicious activity.



Source link

By Computer Weekly

By Computer Weekly

Next Post
Knexus Wins 2025 Google Cloud Business Applications Partner of the Year Award for Government

Knexus Wins 2025 Google Cloud Business Applications Partner of the Year Award for Government

Recommended.

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

Sneaky 2FA Phishing Kit Adds BitB Pop-ups Designed to Mimic the Browser Address Bar

November 18, 2025
European digital market figurehead pleads to Westminster | Computer Weekly

European digital market figurehead pleads to Westminster | Computer Weekly

July 28, 2025

Trending.

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

Chai AI Announces Upcoming Rollout of Apple and Google Age Verification APIs to Enhance Platform Safety

March 10, 2026
Huawei lanceert Next Generation FAN-oplossing

Huawei lanceert Next Generation FAN-oplossing

March 7, 2026
Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

Baidu Announces Fourth Quarter and Fiscal Year 2025 Results

February 26, 2026
Half of Google’s software development now AI-generated | Computer Weekly

Half of Google’s software development now AI-generated | Computer Weekly

February 5, 2026
Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

Ghost Campaign Uses 7 npm Packages to Steal Crypto Wallets and Credentials

March 24, 2026

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio