Recent research by Google Project Zero and Volexity showed sophisticated attacks against both Android and iPhone devices that were targeted at Uighur Muslims. This talk will cover both sets of exploits that led to the installation of malware on the devices and the evolution of how the attacks adjusted their techniques to compromise iPhone devices.
The malware that was installed had a variety of functions but in particular its ability to extract decrypted messages from encrypted chat applications will be discussed and how this particular weakness (the messages being unencrypted on the device) will continue to be exploited in the future.
Finally, details of the campaign and its breadth will be examined. The operation targeted an ethnic and religious minority in China and abroad by compromising websites known to be viewed by that community. Details of both the attack and the targeting suggest it was backed by the government of China, which will continue to use such techniques in the future.