Last week, the user account I-S00N on GitHub posted a significant amount of documents attributed to the Chinese company Anxun, providing spyware and network penetration devices in various formats to steal data. Expressing dissatisfaction with the company’s deception of government agencies and conflicts with employees.
The documents are entirely in Chinese, showcasing a list of products and services that can control a victim’s devices on Windows, Mac, Android, and iOS, with each version offering different features. For instance, iOS can only access contact lists, GPS data, photo files, and record audio similarly to regular apps with permissions. On the other hand, Android can read call logs, web browsing history, installed apps, and even chat message contents with various features focusing heavily on Chinese users, like the capability to search Baidu or WeChat users.
Some devices are designed to hack Wi-Fi networks by guessing passwords and breaking into systems. Of interest, the documents identify previously compromised targets which mainly include mobile phone networks or government agencies across many countries such as South Korea, Kazakhstan, Thailand, Hong Kong, Malaysia, Indonesia, and Vietnam. These targets consist of various Thai governmental and private entities, although no specific information has been posted on GitHub. The files contain telephone data from the Beeline and Tele2 mobile networks.
The entire information is in Chinese, undergoing translation by individuals, while the verification process may require organizations like Beeline or Tele2 to confirm it, along with numerous news outlets reaching out to Anxun for comments.
Source: GitHub – I-SOON, Cybernews, @AzakaSekai_
TLDR: Documents on GitHub reveal Chinese company Anxun providing spyware and network devices targeting various devices and networks, with compromised entities worldwide. Verification efforts ongoing.
Leave a Comment