Affiliate Disclosure
If you buy through our links, we may get a commission. Read our ethics policy.

iOS vulnerability exploited to spy on Uyghurs in China

An illustration of how Insomnia works. | Source: Volexity

Cybersecurity firm Volexity on Tuesday said it discovered a new iOS exploit that was recently used to surveil the Uyghur Muslim minority in China.

In July 2019, Apple patched a handful of security vulnerabilities in its mobile operating system with the iOS 12.4 update, including several flaws in WebKit. But researchers at Volexity said that at least one of those flaws was actively exploited in the wild in 2020.

The exploit, which Volexity has dubbed "Insomnia," was loaded onto user devices after they visited websites themed around China's Uyghur minority. Attackers then used the exploit, which granted them root access to user devices, to steal plaintext messages from various messaging clients, emails, photos, contact lists and GPS location data.

Reportedly, the Insomnia exploit was used in the wild between January and March 2020.

Volexity said the exploit was deployed by a hacking group they've called Evil Eye, which they believe to be a state-sponsored outfit operating on behalf of China to spy on the Uyghur minority.

The hacking group is also believed to be the threat actor behind a similar slate of iOS surveillance exploits discovered by Google and Volexity in August 2019. Those exploits were used to spy on Uyghurs in China since at least 2016.

Compared to the previous exploits, Insomnia was expanded to target and include end-to-end encrypted communications from apps like ProtonMail and Signal. Researchers think that suggests Uyghurs were aware of surveillance taking place and were taking steps to protect their communications.

Since Insomnia is a WebKit-based exploit, it works on any browser running on an iOS device. Researchers confirmed that Safari, Chrome and Microsoft Edge browsers were vulnerable, meaning any iOS user who visited the Uyghur-themed websites could become infected.

The WebKit vulnerability was present in iOS 12.3, iOS 12.3.1 and iOS 12.3.2, but iOS 12.4 and newer versions are safe. It's worth noting that Insomnia did not achieve persistence on a device, which means that a simple reboot is enough to remove its malicious code.



13 Comments

bulk001 16 Years · 795 comments

“Researchers think that suggests Uyghurs were aware of surveillance taking place and were taking steps to protect their communications.”

Needs someone to proof this article. 

lkrupp 19 Years · 10521 comments

So the U.S. government doesn’t really need a backdoor then.

mknelson 9 Years · 1148 comments

Odd if the iOS exploit was only used this year (or maybe only noticed?) when iOS was patched in July 2019. They wouldn't have had many vulnerable devices to exploit.

Although, since they really only need to be able to crack one end of the communication there is a multiplier effect.

Harrigan 6 Years · 1 comment

bulk001 said:
“Researchers think that suggests Uyghurs were aware of surveillance taking place and were taking steps to protect their communications.”

Needs someone to proof this article. 

Why? It might work better to replace "suggests" with "indicates", but that's not a proofreading oversight. 

viclauyyc 10 Years · 847 comments

Russia/USSR threatens the western world. China threatens their own people.  

Chicom is the cancer of the world.