Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Incidents

APTs Use Fake Dalai Lama Apps to Spy

July 25, 2025
Reading Time: 3 mins read
in Incidents
Infostealer Hidden in Steam Game

In a calculated cyber espionage campaign conducted last month, a China-nexus threat actor targeted the global Tibetan community ahead of the Dalai Lama’s 90th birthday on July 6, 2025. The dual campaigns, identified by Zscaler ThreatLabz as “Operation GhostChat” and “Operation PhantomPrayers,” leveraged the significant cultural event to deceive individuals into compromising their own systems. This activity highlights a continued pattern of digital surveillance aimed at the Tibetan diaspora, exploiting community-focused events to deploy malware and gather intelligence.

The first campaign, Operation GhostChat, involved a sophisticated watering hole attack. The attackers compromised a legitimate web page on tibetfund[.]org and altered a link intended for well-wishers. The malicious link redirected users to a fraudulent replica website, thedalailama90.niccenter[.]net, which prompted them to download a supposed secure chat application named “TElement” to send encrypted messages. This application was a backdoored version of the legitimate Element client, engineered to use DLL sideloading to install Gh0st RAT, a potent remote access trojan. The malicious site also used JavaScript to collect visitor IP addresses and user-agent details.

The second prong of the attack, Operation PhantomPrayers, used a similar lure on a different fraudulent domain, hhthedalailama90.niccenter[.]net. This site distributed a phony “90th Birthday Global Check-in” application. The app, named DalaiLamaCheckin.exe, displayed an interactive map and encouraged victims to “send your blessings” by tapping their location. This deceptive engagement was designed to trick users into running the malicious software. The primary payload in these operations, Gh0st RAT, is a full-featured trojan widely used by Chinese hacking groups, capable of keylogging, screen capture, file manipulation, and activating webcams and microphones.

This methodology is a classic example of a strategic web compromise, or watering hole attack, where adversaries target websites frequently visited by a specific group. Instead of pursuing individuals directly, they poison a trusted digital gathering place, knowing their targets will eventually visit and become infected. This tactic is not new in campaigns against this community; over the past two years, hacking groups like EvilBamboo, Evasive Panda, and TAG-112 have repeatedly used this approach to deploy malware and gather sensitive information from the Tibetan diaspora.

Ultimately, these espionage campaigns underscore a persistent effort to monitor and infiltrate the Tibetan community by exploiting their trust and cultural events. By weaponizing the Dalai Lama’s 90th birthday celebrations, the threat actors created a highly effective lure to ensure their malware reached its intended targets. The ultimate goal remains unchanged: to gather sensitive information, monitor activists, and maintain surveillance over a community that continues to be of high political interest to the Chinese state.

Reference:

  • China-Based APTs Deploy Fake Dalai Lama Android Apps to Spy on and Track the Tibetan Community
Tags: cyber incidentsCyber Incidents 2025Cyber threatsJuly 2025
ADVERTISEMENT

Related Posts

Belgian Telecoms Hit By Cyberattack

Hackers Steal Data From Swiss Bank

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Belgian Telecoms Hit By Cyberattack

November 6, 2025
Belgian Telecoms Hit By Cyberattack

Sandworm Wipers Hit Ukraines Grain Hub

November 6, 2025

Hackers Target UK Water Suppliers

November 5, 2025

Nikkei Data Breach Hits 17000

November 5, 2025
Microsoft Edge Adds Scareware Sensor

Apache OpenOffice Denies Breach

November 5, 2025

Latest Alerts

Russia Group Exploits Windows HyperV

SkyCloak Backdoor Targets Defense Firms

Teams Bugs Let Hackers Impersonate

Post SMTP Plugin Hijacks Admins

React Native CLI Flaw Exposed

Smudged Serpent Targets US Experts

Subscribe to our newsletter

    Latest Incidents

    Hackers Steal Data From Swiss Bank

    Belgian Telecoms Hit By Cyberattack

    Sandworm Wipers Hit Ukraines Grain Hub

    Hackers Target UK Water Suppliers

    Nikkei Data Breach Hits 17000

    Apache OpenOffice Denies Breach

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial