Hong Kong democracy activist websites compromised

The attacks are suspected to be aimed at compromising activists

Four websites promoting democracy in Hong Kong have been rigged to deliver malicious software, according to a Washington, D.C.-based security company.

The findings show that "dissenting groups, especially those seeking increased levels of freedom, frequently find themselves targeted for surveillance and information extraction," wrote Steven Adair of Volexity in a blog post.

Security experts have seen an uptick in attacks aimed at spying on activists in Hong Kong, who have led demonstrations in protest of restrictions China has placed on the election for the territory's chief executive in 2017.

The websites are the Alliance for True Democracy (ATD), the Democratic Party Hong Kong (DPHK), People Power in Hong Kong and The Professional Commons. Browsing to the websites isn't wise since some of the attacks are still active, he wrote.

The ATD and DPHK websites both had code planted that pulls in a suspected malicious script from another domain, "java-se.com," which has been linked to malicious activity in the past, Adair wrote. That domain was also used in an attack on "www.nikkei.com" in early September.

Volexity was unable to obtain the script for analysis, perhaps because the attackers were filtering out certain IP addresses that are allowed to retrieve the script, Adair wrote.

The People Power in Hong Kong website contains a malicious iframe that points to a Chinese URL shortener address, which then redirects a visitor to an exploit page hosted on a Hong Kong IP address.

After polling the computer to see what software is running, the malicious page can load Java exploits and download malware. Volexity believes that this attack was executed by a different group and is not related to the one using "java-se.com."

The last website, The Professional Commons, contains suspicious JavaScript that loads an iframe which points to the website of a hotel in South Korea, Adair wrote. The iframe tries to load an HTML page that doesn't exist on the South Korean website, which Adair wrote indicates that it is a formerly active attack.

"If it is actually malicious, it is possible the code could be re-activated at any time," he wrote.

Earlier this month, analysts found malware for both Android and iOS believed to be targeting Hong Kong demonstrators. The malware can steal text messages, call logs and other sensitive data from smart phones.

"This is not the first time and surely will not be the last time that those in favor of democracy in Hong Kong will be targeted," Adair wrote. "Unfortunately with the level of access and infrastructure the attackers appear to have, this is quite an uphill battle."

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the CSO newsletter!

Error: Please check your email address.

Tags securityVolexitymalware

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Jeremy Kirk

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts