Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

China-Based APTs Deploy Fake Dalai Lama Apps to Spy on Tibetan Community

Posted on July 24, 2025July 24, 2025 By CWS

Jul 24, 2025Ravie LakshmananCyber Espionage / Malware
The Tibetan group has been focused by a China-nexus cyber espionage group as a part of two campaigns performed final month forward of the Dalai Lama’s ninetieth birthday on July 6, 2025.
The multi-stage assaults have been codenamed Operation GhostChat and Operation PhantomPrayers by Zscaler ThreatLabz.
“The attackers compromised a authentic web site, redirecting customers through a malicious hyperlink and in the end putting in both the Gh0st RAT or PhantomNet (aka SManager) backdoor onto sufferer programs,” safety researchers Sudeep Singh and Roy Tay stated in a Wednesday report.
This isn’t the primary time Chinese language menace actors have resorted to watering gap assaults (aka strategic net compromises), a way the place adversaries break into web sites often visited by a selected group to contaminate their gadgets with malware.

Over the previous two years, hacking teams like EvilBamboo, Evasive Panda, and TAG-112 have all resorted to the strategy to focus on the Tibetan diaspora with the last word objective of gathering delicate info.
Operation GhostChat
The most recent set of assaults noticed by Zscaler entails the compromise of an online web page to exchange the hyperlink pointing to “tibetfund[.]org/90thbirthday” with a fraudulent model (“thedalailama90.niccenter[.]internet”).
Whereas the unique net web page is designed to ship a message to the Dalai Lama, the reproduction web page provides an choice to ship an encrypted message to the non secular chief by downloading from “tbelement.niccenter[.]internet” a safe chat utility named TElement, which claims to be Tibetan model of Ingredient.
Hosted on the web site is a backdoored model of the open-source encrypted chat software program containing a malicious DLL that is sideloaded to launch Gh0st RAT, a distant entry trojan broadly utilized by varied Chinese language hacking teams. The net web page additionally consists of JavaScript code designed to gather the customer’s IP deal with and user-agent info, and exfiltrate the small print to the menace actor through an HTTP POST request.
Operation PhantomPrayers
Gh0st RAT is a fully-featured malware that helps file manipulation, display screen seize, clipboard content material extraction, webcam video recording, keylogging, audio recording and playback, course of manipulation, and distant shell.
The second marketing campaign, Operation PhantomPrayers, has been discovered to leverage one other area, “hhthedalailama90.niccenter[.]internet,” to distribute a phony “ninetieth Birthday World Test-in” app (“DalaiLamaCheckin.exe,” dubbed PhantomPrayers) that, when opened, shows an interactive map and urges victims to “ship your blessings” for the Dalai Lama by tapping their location on the map.

Nevertheless, the malicious performance is stealthily triggered within the background, utilizing DLL side-loading strategies to launch PhantomNet, a backdoor that establishes contact with a command-and-control (C2) server over TCP to obtain extra plugin DLLs for execution on the compromised machine.
“PhantomNet will be set to function solely throughout particular hours or days, however this functionality will not be enabled within the present pattern,” the researchers stated. “PhantomNet used modular plugin DLLs, AES-encrypted C2 visitors, and configurable timed operations, to stealthily handle compromised programs.”

The Hacker News Tags:Apps, APTs, ChinaBased, Community, Dalai, Deploy, Fake, Lama, Spy, Tibetan

Post navigation

Previous Post: Storm-2603 Exploits SharePoint Flaws to Deploy Warlock Ransomware on Unpatched Systems
Next Post: Pentests once a year? Nope. It’s time to build an offensive SOC

Related Posts

Security Tools Alone Don’t Protect You — Control Effectiveness Does The Hacker News
New Sni5Gect Attack Crashes Phones and Downgrades 5G to 4G without Rogue Base Station The Hacker News
New Linux Flaws Allow Password Hash Theft via Core Dumps in Ubuntu, RHEL, Fedora The Hacker News
Cisco ASA Zero-Day Duo Under Attack; CISA Triggers Emergency Mitigation Directive The Hacker News
North Korea-linked Actors Exploit React2Shell to Deploy New EtherRAT Malware The Hacker News
Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks
  • Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
  • Microsoft Teams to Share your Location With Your Employer Soon Based on Wi-Fi Network
  • Nike Probing Potential Security Incident as Hackers Threaten to Leak Data
  • Threat Actors Leverage SharePoint Services in Sophisticated AiTM Phishing Campaign

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark