Governments Uncover Spyware in Dozens of Android Apps Targeting Civil Society

A coalition of international government agencies has identified numerous Android applications embedded with spyware, covertly targeting individuals and groups perceived as threats to China’s state interests. On April 9, 2025, the United Kingdom’s National Cyber Security Centre (NCSC), in collaboration with agencies from Australia, Canada, Germany, New Zealand, and the United States, released advisories detailing two spyware families: BadBazaar and Moonshine.

These malicious software programs were ingeniously concealed within seemingly legitimate Android applications, effectively functioning as Trojan horses. Once installed, they granted unauthorized access to sensitive data, including the device’s camera, microphone, chat logs, photos, and location information. The NCSC emphasized that these spyware variants specifically targeted Uyghurs, Tibetans, Taiwanese communities, and various civil society organizations.

Background on Targeted Communities

The Uyghurs, a predominantly Muslim ethnic minority in China’s Xinjiang Uyghur Autonomous Region, have faced extensive surveillance, detention, and discrimination by the Chinese government. Similarly, Tibetan and Taiwanese communities have been under scrutiny due to their advocacy for independence and human rights. These groups have frequently been the focus of cyber espionage campaigns aimed at suppressing dissent and monitoring activities.

Details of the Spyware Campaigns

The NCSC’s advisories revealed that BadBazaar and Moonshine were distributed through over 100 Android applications. These apps masqueraded as popular services, including Muslim and Buddhist prayer apps, messaging platforms like Signal, Telegram, and WhatsApp, and utility tools such as Adobe Acrobat PDF reader. The deceptive nature of these applications made it challenging for users to discern their malicious intent.

In addition to Android platforms, the NCSC identified an iOS application named TibetOne, which was available on Apple’s App Store in 2021. This indicates that the spyware campaign extended beyond Android devices, aiming to infiltrate a broader range of user environments.

Technical Analysis and Attribution

Cybersecurity firms like Lookout, Trend Micro, and Volexity, along with the digital rights organization Citizen Lab, have previously analyzed these spyware families. Their research indicates that the deployment of BadBazaar and Moonshine is part of a concerted effort to monitor and suppress activities deemed destabilizing by the Chinese state. The sophisticated nature of these spyware programs suggests the involvement of state-sponsored actors with significant resources and technical capabilities.

Implications for Users and Recommendations

The discovery of these spyware-laden applications underscores the critical importance of vigilance when downloading and installing apps. Users are advised to:

– Download Apps from Trusted Sources: Utilize official app stores and verify the credibility of app developers before installation.

– Review App Permissions: Scrutinize the permissions requested by applications, ensuring they align with the app’s intended functionality.

– Keep Devices Updated: Regularly update operating systems and applications to benefit from the latest security patches.

– Employ Security Solutions: Use reputable antivirus and anti-malware software to detect and prevent potential threats.

By adopting these practices, users can significantly reduce the risk of falling victim to malicious software and protect their personal information from unauthorized access.