First published: 09 Apr 2025
Last updated: 09 Apr 2025

Content written for

Individuals & families
Small & medium business
Large organisations & infrastructure
Government
On this page

Summary

With support from the UK Cyber League, this advisory has been jointly produced by the National Cyber Security Centre (NCSC UK) and international partners:

  • The Australian Cyber Security Centre, part of the Australian Signals Directorate
  • The Canadian Centre for Cyber Security, part of the Communications Security Establishment
  • The German Federal Intelligence Service
  • The German Federal Office for the Protection of the Constitution
  • The New Zealand National Cyber Security Centre, part of the Government Communications Security Bureau
  • The United States Federal Bureau of Investigation
  • The United States National Security Agency

This advisory provides new and collated threat intelligence on two variants of spyware known as BADBAZAAR and MOONSHINE, and includes advice for app store operators, developers and social media companies to help keep their users safe.

This advisory is being published in parallel with an advisory for victims of these malware.

This document uses the NCSC glossary definition of spyware: "A type of malware that installs on a device without the user's consent, collecting data and then sending it to a third party."

Case study one: MOONSHINE

MOONSHINE is an Android spyware reported in 2019 by Citizen Lab as targeting Tibetan groups. MOONSHINE masquerades as a legitimate app to lure victims into installing it. It has been shared via Telegram channels and through links sent via WhatsApp.

The NCSC research into MOONSHINE indicates the following:

  • MOONSHINE uses a management interface that has undergone changes since it was first reported.
  • The management interface reveals extensive surveillance capabilities, including the ability to exfiltrate files from devices as well as capture live audio and screen recordings.
  • A set of virtually hosted MOONSHINE management interfaces have been discovered. These interfaces have infrastructure overlap with login panels associated with UPSEC, which according to Intelligence Online refers to ‘Sichuan Dianke Network Security Technology Co., Ltd.’.

Management interface

Previous reporting of MOONSHINE management interfaces indicates that it has undergone changes, which suggests ongoing development.

The first example of the management interface is found in Citizen Lab’s 2019 reporting.

Figure 1: MOONSHINE management interfaces seen in Citizen Lab's 2019 report 'Missing Link Tibetan Groups Targeted with 1-Click Mobile Exploits'

In early 2022, Lookout reported a different management interface which had been redesigned to look as below (replacing the previous interfaces in figure 1):

Figure 2: MOONSHINE management interface seen in Lookout’s 2022 report ‘MOONSHINE: Evolving Android Surveillanceware by Chinese APT POISON CARP To Target Tibetans and Uyghurs’

In August 2023, a scan of MOONSHINE command and control (C2) revealed an interface similar to the 2022 interface with the ‘Forgot Password’ function no longer available as it is in figure 2:

Figure 3: MOONSHINE management interface observed August 2023 which no longer has a ‘Forgot Password’ prompt

Further investigation of the management interface showed content within the panel which revealed how details of the compromised devices would be stored.

Figure 4: Webpage behind the login page of the MOONSHINE management interface

Lookout research showed the passing of a ‘score’ from the victim device to MOONSHINE C2 servers. The value of the ‘score’ is based on the permissions of the malicious sample on the victim device.

The columns ‘if_contact’, ‘if_location’, ‘if_call_log’ and ‘if_sms’ within the page suggest that not all MOONSHINE samples have full access to compromised devices. Knowledge of these columns and the 'score' passed from the device to the C2 suggests the threat actors are using the score to communicate the level of access the malware has to the compromised device to individuals who are accessing the management interface.

Generally, best-practice advice to prevent apps gathering information from devices is to inspect app permissions for anything unusual before downloading. However, MOONSHINE samples seek permissions which are relevant to the app’s functionality, so may appear unsuspicious, but they also use these permissions to collect information from devices.

MOONSHINE also has an Application Programming Interface (API) revealing the breadth of its capabilities. Early versions of the API documentation contained API names in Mandarin.

Virtual hosts

In searches for MOONSHINE panels, virtually hosted instances were discovered. Virtual hosting is when one IP address can host multiple websites at once. The IP addresses of these virtually hosted instances and the domains hosted, were not observed in any known malware samples.

These instances of the management interface differed, as the title of the pages were ‘LOGIN’ instead of the previously seen ‘SCOTCH ADMIN’.

Figure 5: MOONSHINE management interface using LOGIN title instead of SCOTCH ADMIN

In addition, the content on the panel also differs from figure 4, as seen in figure 6:

Figure 6: Webpage behind the login page of the virtually hosted MOONSHINE management interface

The panel in figure 6 appears to be a stripped-down version of the panel in figure 4. The overlapping characteristics of the panels are the column names ‘id’, ‘manufacturer’ and ‘model’ in the table.

The virtually hosted MOONSHINE instances discovered were:

DomainIP Address
vsa[.]ahamar[.]com194[.]71[.]107[.]160
gates[.]chatonlineapp[.]com172[.]67[.]208[.]167
www[.]onlineweixin[.]net103[.]254[.]108[.]108
www[.]weetogether[.]top103[.]254[.]108[.]108
www[.]onlinewxapp[.]net103[.]43[.]18[.]43
www[.]unusualtransaction[.]com2[.]58[.]15[.]101
m[.]leak-news[.]com103[.]56[.]17[.]194
www[.]unusualtransaction[.]com46[.]246[.]98[.]209
www[.]lodepot[.]com62[.]72[.]58[.]168
www[.]online-wechat[.]com103[.]254[.]108[.]87

These domains are listed by Trend Micro as MOONSHINE exploit kits, responsible for exploiting browser vulnerabilities to install malware on mobile devices. Trend Micro name this malware 'Dark Nimbus'.

For clarification, MOONSHINE management interfaces are what MOONSHINE malware samples communicate with, and victim data is exfiltrated to. MOONSHINE exploit kits reported by Trend Micro, are a separate capability that exploits browser vulnerabilities to install a malware called Dark Nimbus on mobile devices. Furthermore, Dark Nimbus and MOONSHINE are entirely different malware.

Both the MOONSHINE management interface and MOONSHINE exploit kit have code overlap hence the similar login prompts in figures 3 and 5 as well as the content of the page in figures 4 and 6. They also both contain the string ‘webpackJsonpreact-scotchui’ in the source code.

The threat actors generated URL links which connected to the MOONSHINE exploitation kit and then redirected to videos relevant to Tibetans and Uyghurs, which overlaps with the targeting of MOONSHINE.

Across many of the IP addresses hosting the MOONSHINE exploit kit domain, there is a login page titled ‘VLiteUI’ on port 444. This page is not widely observed and its presence on these IPs indicates a possible link to the actors’ operations.

Figure 7: Login panel with HTML title 'VLiteUI' observed on IPs also hosting MOONSHINE panels

Trend Micro’s analysis of Dark Nimbus revealed the malware can collect an exhaustive list of information on the device, and that it communicates with the C2 using the XMPP protocol.

Trend Micro also outlines that in some versions of Dark Nimbus, they identified the prevalence of the string ‘DKNS’.

ansec[.]com’ (listed as a Dark Nimbus C2 by TrendMicro) was also observed in XMPP services for other IP addresses serving web pages with DKNS in the title:

  • DKNS Android远程取证系统 (DKNS Android Remote Forensic System)
  • DKNS云网侦控平台 (DKNS Cloud Network Investigation and Control Platform)
  • DKNS 云网侦控平台 (DKNS Cloud Network Investigation and Control Platform)
  • DKNS远程控制侦查系统 (DKNS Remote Control Investigation System)

Another set of IP addresses with ‘ansec[.]com’ in the XMPP service had web pages with the title:

  • UPSEC互联网控制指挥系统 (UPSEC Internet Control Command System)
  • UPSEC无线侦控系统 (UPSEC Wireless Surveillance and Control System)
  • UPSEC重点人数据还原系统 (UPSEC Key Person Data Restoration System)

According to Intelligence Online, ‘UPSEC’ observed in the titles of the HTML pages, referred to ‘Sichuan Dianke Network Security Technology Co., Ltd’.

Case study two: BADBAZAAR

BADBAZAAR is a mobile malware with iOS and Android variants that have targeted Uyghurs, Tibetans and Taiwanese individuals. This spyware is spread via social media platforms and official app stores. Recent reporting from Volexity shows different variants of BADBAZAAR, which are separated as BadSolar, BADBAZAAR and BadSignal. All three variants are linked together by overlapping functions used for collecting device and operator information.

The NCSC research into BADBAZAAR revealed the following:

  • Clustering C2 domains reveal further links to domains reported in historical threat intelligence.
  • C2 servers and malware samples reveal hostnames associated with actor infrastructure.
  • Further profiles which the threat actors use for social engineering to spread their malware beyond official app stores.

WHOIS clustering / domain broker

‘UJYJYUJ’

Analysis of the WHOIS records for the BADBAZAAR domain ‘signalplus[.]org’ (reported by ESET) show the value ‘UJYJYUJ’ in the ‘State’ field.

A search for other domains with the same value reveals the following domains of interest:

  • thetubeplus[.]com
  • tubevideoplus[.]org
  • pmumail[.]com
  • signalplus[.]org

The domains signalplus[.].org, tubevideoplus[.]org and thetubeplus[.]com are reported BADBAZAAR C2 domains, while ESET reports the sub domain mail.pmumail[.]com as a FlyGram proxy server. FlyGram is a BADBAZAAR app developed by the malicious cyber actors (see Appendix for a list of other BADBAZAAR apps).

Keyboard walking values

The NCSC has also seen similar keyboard walking patterns in other registered BADBAZAAR C2 domains.

For example, the following domains all have the value ‘REWR’ observed in the ‘State’ field (as used previously):

  • yumoftion[.]com
  • fvbyavgyea[.]com
  • jkiohreh[.]com
  • pmstwocqn[.]com

Domains with ‘FSDF’ state field values

Another set of BADBAZAAR C2 domains have 'State' value 'FSDF':

  • tryhrwserf[.]com
  • tibetone[.]org
  • comeflxyr[.]com

Historical reporting with keyboard walking values

The use of keyboard walking values in the WHOIS records of BADBAZAAR domains can also be seen in historically reported targeting of Tibetan organisations by TA413. Recorded Future has observed actor-controlled domains spoofing Tibetan organisations and the use of a registrant organisation value of "asfasf".

clublogs[.]com

BADBAZAAR samples obtained by Lookout contained ‘xle.clublogs[.]com’ as the C2 domain. The root domain ‘clublogs[.]com’ was hosted on IP address ‘95.179.210[.]85’ and had an SSL certificate with the subject and issuer value of ‘CN=WIN-50QO3EIRQVP’. This value matched SSL certificates found in BADBAZAAR samples which used SSL pinning to avoid interception of communications.

The hosting history for IP address 95.179.210[.]85 returns the following domains of interest:

  • actuallys[.]com
  • bre.myloughborough[.]com
  • rewrwer[.]com
  • www.voiceoftibet[.]net
  • clublogs[.]com

www.voiceoftibet[.]net

The domain ‘www.voiceoftibet[.]net' appeared to be masquerading as the ‘Voice of Tibet’ radio station, similar to the TTP used by TA413.

The domain ‘rewrwer[.]com’ is similar to the previously identified ‘State’ value ‘REWR’ found in the WHOIS records of the BADBAZAAR domains.

The domains 'clublogs[.]com', 'rewrwer[.]com', 'voiceoftibet[.]net' and 'myloughborough[.]com' were all registered with email address 'tplutalova@list.ru'.

actuallys[.]com

The WHOIS records for ‘actuallys[.]com’ showed an instance where the tech and admin email addresses were ‘tplutalova@list.ru’ but the registrant email was ‘ivan_s81@mail.ru’.

Historical WHOIS information for the domain ‘actuallys[.]com’ revealed registration email ‘wangminghua6@gmail.com’ listed on 24 February 2016. On 11 March 2016, the email was subsequently changed to ‘ivan_s81@mail.ru’ although the registration expiration date remained the same.

wangminghua6@gmail.com

The email address ‘wangminghua6@gmail.com’ was used to register domains found in historical threat intelligence reporting. In 2015, Palo Alto identified the email used to register C2 domains for the malware, Cmstar. In 2014, it was also used to register domains identified by Mandiant in phishing campaigns conducted by APT3. In 2013, it was used to register domains found by CrowdStrike in a malware dropper with a Program Database (PDB) path containing Chinese characters. This suggests compilation on a Chinese system.

taoyujun@gmail.com

The domain ‘hcjbtt[.]com’ is registered with email address ‘taoyujun@gmail.com’ but its administrator email is registered with ‘wangminghua6@gmail.com’. 

There is no malicious activity linked to domain ‘hcjbtt[.]com’, however the email address ‘taoyujun@gmail.com’ was found in historical threat intelligence reports. In 2014, it was used to register a domain found by Mandiant in ‘Cueisfry Trojan’ samples used in targeting of Japanese organisations.

The email address also registered domains such as ‘iaea-international[.]org’ which appeared to masquerade as the International Atomic Energy Agency and ‘idc-ctbto[.]org’ masquerading as the International Data Centre at the Comprehensive Nuclear-Test-Ban Treaty Organisation (CTBTO)

An earlier Whois record for the domain ‘iaea-international[.]org’ showed the registrant email to be ‘wangminghua6@gmail.com’.

udtglobals[.]com

The domain ‘udtglobals[.]com’ was observed using ‘wangminghua6@gmail.com’ as the administrator email and ‘ocean.nio@rediffmail.com’ as the registrant email address. Other WHOIS records for this domain, showed the same registrant email but with the administrator email address ‘taoyujun@gmail.com’.

udtglobals[.]com’ appeared to be masquerading as ‘UDT Global’ which is a global event for undersea defence and security companies. The username ‘ocean.nio’ within the email address could be imitating the National Institute of Oceanography (NIO) which exists in multiple countries. Although the use of the ‘Rediff’ email service (which is India-based) could suggest imitation of the Indian National Institute of Oceanography.

Djibdiplomatie[.]com

The domain ‘djibdiplomatie[.]com’ appeared to masquerade Djibouti diplomacy services, which had a similar WHOIS record to ‘utdglobals[.]com’. One record appeared to show the registrant ‘ocean.nio@rediffmail.com’ and admin ‘taoyujun@gmail.com’ whereas other records showed ‘wangminghua6@gmail.com’ as the admin email address with ‘ocean.nio@rediffmail.com’ as the registrant email.

Both these domains also had keyboard walking type values in the WHOIS records. For example, ‘udtglobals[.]com’ has the value ‘ASDF’ as its registrant city and ‘djibdiplomatie[.]com’ has ‘DAF DAGF’ as its registrant name value. This is comparable to the values observed in other BADBAZAAR domains.

Although the email addresses ‘wangminghua6@gmail.com’ and ‘taoyujun@gmail.com’ are found in WHOIS records for domains masquerading as a global undersea defence event, Djibouti diplomacy services and the International Atomic Energy Agency, they are also in WHOIS records for numerous non-malicious domains.

The mix of masquerading domains and non-malicious domains could suggest the existence of an infrastructure procuring entity used to support the malicious actors' cyber operations.

The email address ‘ocean.nio@rediffmail.com’ is only found in the masquerading domains described above. ‘ivan_s81@mail.ru’ and ‘tplutalova@list.ru’ have registered a very small number of domains respectively, and some of these domains have been hosted on BADBAZAAR infrastructure. These three email addresses are believed to be more closely linked to the malicious cyber actors' operations. This is because a higher number of domains they are associated with are linked to malicious activity, in comparison to emails ‘wangminghua6@gmail.com’ and ‘taoyujun@gmail.com’.

Links to other threat actors

Another common characteristic of the BADBAZAAR linked domains ‘actuallys[.]com’, ‘clublogs[.]com’, ‘myloughborough[.]com’, ‘rewrwer[.]com’, and ‘voiceoftibet[.]net’ is that they were all registered with eNom and had been ‘parked’ at ‘255.255.255.254’.

Following previous NCSC investigations, other domains with these characteristics revealed activity linked to APT5 in 2019, and APT14 between 2009 and 2011.

The APT5 linked domains had historical WHOIS records which listed ‘taoyujun@gmail.com’ as the registrant email address.

The APT14 linked domains had three-letter subdomains which appeared to represent the intended target of their malicious operations. An example of this is ‘bae.cisconline[.]net’, which suggested intended targeting of BAE Systems and was found in a ‘Poison Ivy’ sample.

A similar characteristic is observed in BADBAZAAR domains where the subdomains relate to the name of the trojanised app:

Application titleC2 URL
Muslim Prompp.pmstwocqn[.]com
Video Player for Androidvpf.titeperformance[.]com
Batter Masterbat.androidupdated[.]net
Radio Afghanistanafg.collinformations[.]com
EN-UG Dictionary Freeeud.titeperformance[.]com
Disk Video Recoverydvr.collinformations[.]com
TextNowttn.titeperformance[.]com

It is important to note that the activities related to APT5 and APT14 were historical and there were also other domains registered with eNom and resolved to ‘255.255.255.254’ which cannot be linked to malicious activity. It is therefore not certain that the actors behind these campaigns are the same or related.

Machine names

Analysis of BADBAZAAR C2s and samples revealed hostnames used as the ‘Common Name’ value in SSL certificates. NCSC investigations into hostnames observed in BADBAZAAR samples and infrastructure showed that these hostnames are used across multiple IP addresses. These IP addresses are hosting domains found in BADBAZAAR samples. There is more detail in the section below about the hostnames, and IP addresses with the hostname hosting BADBAZAAR C2 domains.

In almost all cases the presence of certificates with the hostname value overlaps with IP resolutions for the malicious domain names specified, the few instances where this was not the case have been outlined.

WIN-EU0VLBL7TUJ

Hostname ‘WIN-EU0VLBL7TUJ’ was observed on the following IP addresses of interest:

  • '116.203.53[.]21’ hosted BADBAZAAR C2 domains ‘uyapkfinder[.]com’ and ‘thewestuniverse[.]com’.
  • 95.216.169[.]27’ hosted BADBAZAAR C2 domains ‘adysfunction[.]com’ and sub-domain ‘download.apkbazar[.]biz’ observed as a download link for a BADBAZAAR sample.

WIN-70E59JVOB9G

Hostname ‘WIN-70E59JVOB9G’ was observed on the following IP addresses of interest:

  • 23.88.28[.]220’ hosted BADBAZAAR C2 sub-domains, ‘aua.rondwsign[.]com’, ‘nal.tokenmajorp[.]com’, ‘pep.rondwsign[.]com’, ‘doa.rondwsign[.]com’ and ‘pls.rondwsign[.]com’. There was a period of two days between when the certificate with the machine was last seen, and when the malicious domains were first seen resolving to the IP.
  • 23.88.28[.]221’ hosted BADBAZAAR linked sub-domain ‘bt.bhvghg[.]com’.
  • 23.88.28[.]222’ hosted BADBAZAAR C2 domains ‘tubevideoplus[.]org’ and ‘cde.mpoxcases[.]com’.
  • 65.21.92[.]67’ hosted BADBAZAAR C2 sub-domain ‘bat.androidupdated[.]net’. It also hosted sub-domain ‘apps.androidupdated[.]net’ which is a DoubleAgent malware C2.
  • 65.21.92[.]77’ hosted BADBAZAAR C2 sub-domains ‘wyo.titeperformance[.]com’, ‘big.collinformations[.]com
    vpf.titeperformance[.]com’, ‘eud.titeperformance[.]com’ and ‘afg.collinformations[.]com
  • 65.108.192[.]134’ hosted BADBAZAAR C2 sub-domains ‘upd.whoscaller.net’ and ‘ggl.whoscaller[.]net’.
  • 142.132.131[.]15’ hosted BADBAZAAR C2 sub-domains ‘bvn.lookincategory[.]com’ and ‘edr.lookincategory[.]com’. There was a period of eleven days between when the certificate with the machine name was last seen, and when the malicious domains were first seen resolving to the IP.
  • 142.132.131[.]20’ hosted sub-domains ‘son.onlinegamersgroup[.]com’ and ‘system.onlinegamersgroup[.]com’, believed to be BADBAZAAR C2s as they were hosted whilst BADBAZAAR associated SSL certificates were observed on the IP.
  • 142.132.131[.]28’ hosted BADBAZAAR C2 domain ‘goldplusapp[.]net’ and sub-domains ‘who.goldplusapp[.]net’ and ‘cgf.goldplusapp[.]net’.
  • 162.55.103[.]211’ hosted BADBAZAAR C2 sub-domains ‘oha.alpinemap[.]net’, ‘aru.aplinemap[.]net’, ‘aso.alpinemap[.]net’, ‘afr.alpinemap[.]net’ and ‘aar.alpinemap[.]net’.
  • 162.55.103[.]212’ hosted BADBAZAAR C2 sub-domains ‘pep.rondwsign[.]com’, ‘ckp.jkiohreh[.]com’, ‘aar.tokenmajorp[.]com’, ‘nal.tokenmajorp[.]com’, ‘pls.rondwsign[.]com’ and ‘aua.rondwsign[.]com’.
  • 195.154.47[.]99’ hosted BADBAZAAR C2 sub-domains ‘ggl.whoscaller[.]net’ and ‘upd.whoscaller.net’. There was a period of three days between when the certificate with the machine name was first seen and when the malicious domains were last seen resolving to the IP.
  • 195.154.60[.]3’ hosted BADBAZAAR C2 sub-domains ‘upd.whoscaller[.]net’ and ‘ggl.whoscaller[.]net’.
  • 212.83.189[.]89’ hosted BADBAZAAR C2 sub-domains ‘wyo.titeperformance[.]com’, ‘eud.titeperformance[.]com’, ‘vpf.titeperformance[.]com’ and ‘afg.collinformations[.]com’.
  • 212.129.21[.]168’ hosted BADBAZAAR C2 domains ‘fre.lookincategory[.]com’, ‘tgr.lookincategory[.]com’, ‘fgt.lookincategory[.]com’, ‘luj.lookincategory[.]com’ and ‘bvn.lookincategory[.]com’.

WIN-50QO3EIRQVP

Hostname ‘WIN-50QO3EIRQVP’ was observed on the following IP addresses of interest:

  • 45.76.132[.]91’ hosted domains, ‘yumoftion[.]com’ and ‘androidupdated[.]net’. Both domains are linked to BADBAZAAR as subdomains ‘fow.yumoftion[.]com’ and ‘bat.androidupdated[.]net’ are BADBAZAAR C2 domains. Additionally sub-domain ‘apps.androidupdated[.]net’ is a DoubleAgent C2 domain. It also hosts domain ‘pmstwocqn[.]com’, linked to BADBAZAAR through WHOIS records.
  • 95.179.210[.]85’ hosted ‘clublogs[.]com’, of which ‘xle.clublogs[.]com’ is a BADBAZAAR C2 domain and also hosted BADBAZAAR linked domains ‘bre.myloughborough[.]com’, ‘img.rewrwer[.]com’, 'www.voiceoftibet[.]net' and ‘actuallys[.]com’.
  • 199.247.21[.]34’ hosted ‘titeperformance[.]com’ and ‘collinformation[.]com’ of which subdomains are BADBAZAAR C2 domains.
  • 217.69.10[.]128’ hosted BADBAZAAR C2 domain ‘uyghurdict[.]com’.

WMSvc-50QO3EIRQVP

Hostname ‘WMSvc-WIN-50QO3EIRQVP’ was observed on the following IP addresses of interest:

  • 78.46.185[.]251’ hosted BADBAZAAR C2 domain ‘groupgram[.]org’, reported by Volexity to be using port 4432 for malicious connections.
  • 65.21.92[.]69’ and ‘163.172.205[.]207’ hosted domain ‘widelygram[.]org’ which is believed to be a BADBAZAAR C2 domain, as whilst being hosted on both IPs, port 4432 was open.
  • 163.172.198[.]206’ hosted domain ‘maxgram[.]org’ which is believed to be a BADBAZAAR C2 domain, as whilst it was being hosted port 4432 was open.

WMSvc-WIN-50QO3EIRQVP & WIN-7LSBB9R0F1L

Hostnames ‘WMSvc-WIN-50QO3EIRQVP’ and ‘WIN-7LSBB9R0F1L’ were observed on the following IP address simultaneously:

  • 148.251.87[.]245’ hosted BADBAZAAR C2 domains ‘flygram[.]org’ and ‘groupgram[.]org’.

WIN-N8H8S9BG2P0

Hostnames ‘WIN-N8H8S9BG2P0’ was observed on the following IP address:

  • 148.251.87[.]247’ hosted BADBAZAAR C2 domains ‘omarwhatsapp[.]org’ and ‘flygram[.]org’.

WIN-I6VBN8MR92A

Hostnames ‘WIN-I6VBN8MR92A’ was observed on the following IP address:

  • 148.251.87[.]197’ hosted BADBAZAAR C2 domain ‘tryhrwserf[.]com

Based on available commercial data the prevalence of these machine names across the internet varies. Some of them are observed simultaneously across multiple IP addresses which indicates VMs being created from the same template. It’s important to note that for some of the hostnames, not all of the IPs on which they were observed can be linked to malicious activity. This could mean that use of the hostnames is not exclusive to these threat actors.

However, the prevalence of some of these machine names across IPs which have hosted BADBAZAAR C2 domains, could suggest that an infrastructure-procuring entity is being used to configure machines to support the malicious actor’s cyber operations.

Social media presence

Previous reporting by Volexity showed that YouTube videos (promoting the use of the malicious applications) were created by the malicious cyber actors. These videos included tutorials on how to use the applications developed.

The NCSC has discovered two additional YouTube channels associated with the threat actors' operations. The YouTube channel with URL handle ‘@josephjoey3499’ appeared to be promoting the use of ‘Maxgram’ and an additional channel registered with ‘@uyghurapks3096’ promotes ‘Uyghur APK Finder’.

Additionally, YouTube videos promoting ‘Flygram’ and ‘Signal Plus’, showed the threat actors using visible phone numbers. In the Flygram’ video, at 0:36 phone number ‘+1 (570) 378-7250’ is visible and during the Signal Plus’ video, the phone number ‘+1 (267) 298 4259’ is revealed.

Volexity reported a fake Tibet-themed news site ‘ignitetibet[.]net’, which they discover in Telegram channels believed to be operated by the threat actors. Email address 'choekyi.wangmo@ignitetibet.net' is observed leaving comments on posts on the page 'tibetone.org' which has been publicly reported by Lookout as a C2 page used for the iOS variant of BADBAZAAR.

This email address is believed to be actor controlled, using the persona of ‘Choekyi Wangmo’.

Assessment

BADBAZAAR and MOONSHINE use several social engineering methods to specifically target Uyghur, Tibetan and Taiwanese communities, namely:

  • the trojanisation of apps of interest to these communities, such as a Uyghur language Quran app, is almost certainly tailored to the target victim base.
  • the adding of these trojanised apps to official app stores highly likely lends a sense of legitimacy, and the sharing in group chats is highly likely intended to exploit trusted relationships within these communities.

BADBAZAAR and MOONSHINE collect data which would almost certainly be of value to the Chinese state. Although BADBAZAAR and MOONSHINE have been observed targeting Uyghur, Tibetan and Taiwanese individuals, there are other malwares that target other minority groups in China. Citizens from the co-sealing nations, in China and abroad, who are perceived to be supporting causes that threaten regime stability, are almost certainly under threat from mobile malware such as BADBAZAAR and MOONSHINE. The capability to capture location, audio and photo data almost certainly provides the opportunity to inform future surveillance and harassment operations by providing real-time information on the target’s activity.

MITRE ATT&CK®

This report has been compiled with respect to the MITRE ATT&CK® framework, a globally accessible knowledge base of adversary tactics and techniques based on real-world observations.

TacticIDTechniqueProcedure
ReconnaissanceT1593.001 Search Open Websites/Domains: Social MediaActors find online groups and forums matching their intended victims to share the malware
Resource DevelopmentT1583.001 Acquire Infrastructure: DomainsActors register domains for their command and control servers
Resource DevelopmentT1587.001 Develop Capabilities: MalwareMalicious code is written for insertion into trojanised apps
Resource DevelopmentT1608.001 Stage Capabilities: Upload MalwareTrojanised apps are uploaded to online platforms including app stores
Resource DevelopmentT1585.001 Establish Accounts: Social Media AccountsActors create accounts on websites and social media to share and advertise the malware
Resource DevelopmentT1585.002 Establish Accounts: Email AccountsActors use privately hosted and commercial email accounts for hosting and sharing of malware
Initial AccessT1189 Drive-by CompromiseMalicious scripts are hidden in otherwise legitimate apps and uploaded to app stores
Initial AccessT1566.003 Phishing: Spearphishing via ServiceActors send trojanised apps to targeted groups via social media including Telegram
ExecutionT1204.002 User Execution: Malicious FileVictims have to install the trojanised apps to execute the payload
Defense EvasionT1027.009 Obfuscated Files or Information: Embedded PayloadsThe malicious payload is hidden within otherwise legitimate apps
Defense EvasionT1036.005 Masquerading: Match Legitimate Name or LocationTrojanised files match the name, appearance and function of legitimate apps.
Defense EvasionT1656 ImpersonationActors impersonate trusted individuals by creating cover websites and using usernames associated with target groups
CollectionT1123Audio CaptureThe trojanised apps may request unnecessary permissions including microphone access
CollectionT1125 Video CaptureThe trojanised apps may request unnecessary permissions including camera access
CollectionT1005 Data from Local SystemThe trojanised apps may request unnecessary permissions including local files.
Command and ControlT1071.001Application Layer Protocol: Web ProtocolsMalware connects to C2 using HTTPS and WebSocket’s.
Command and ControlT1509Non-Standard PortNonstandard ports are used such as port 4432 and 2333
ExfiltrationT1041Exfiltration Over C2 ChannelMalware exfiltrates data using HTTPS and WebSocket connections.

Indicators

MOONSHINE

  • On 1st April 2025, a search for VLiteUI panels returned the following:
IP AddressPortFirst SeenLast Seen
103.254.108[.]878882024-10-172025-02-14
43.159.192[.]74442024-11-212025-02-13
103.27.109[.]1094442024-07-112025-02-07
45.119.99[.]834442024-12-262025-01-24
103.254.108[.]764442024-09-122024-12-05
194.71.107[.]1604442023-12-102024-11-01
103.254.108[.]1084442023-11-122024-09-25
103.56.17[.]1944442024-04-032024-08-23
103.254.108[.]874442023-11-142024-08-15
62.72.58[.]1684442024-01-292024-08-07
103.43.18[.]434442024-02-122024-07-19
77.91.123[.]2084442024-02-042024-04-09
46.246.98[.]2294442024-03-072024-03-26
2.58.15[.]1014442024-02-232024-02-27
46.246.98[.]2094442024-01-082024-02-14
103.254.108[.]8780002023-10-172023-10-17
103.254.108[.]10890902023-04-132023-10-16
103.254.108[.]8780802023-04-152023-10-16
103.45.66[.]12390902023-03-022023-04-08
103.45.66[.]3280802022-07-292023-04-06
27.124.20[.]2390902022-05-282023-03-24
27.124.20[.]2290902022-05-282023-03-23
27.124.20[.]2490902022-05-272023-03-17
69.176.94[.]14890902023-03-042023-03-10
69.176.94[.]22890902022-12-242023-02-25
103.253.40[.]13780002022-06-242022-09-02
27.124.4[.]8080802022-02-252022-06-23
27.124.4[.]8180802022-02-252022-06-23
47.242.46[.]7980802021-05-032022-06-17
27.124.4[.]8280802022-02-242022-06-15
27.124.4[.]16590902022-05-142022-05-28
27.124.4[.]18490902022-05-142022-05-27
27.124.4[.]17890902022-05-132022-05-26
103.15.28[.]16580802022-03-052022-05-25
69.176.94[.]22680802022-03-052022-04-22
27.124.4[.]380802022-03-112022-04-02
103.140.238[.]23580802022-03-042022-04-01
27.124.4[.]280802022-03-122022-04-01
165.84.180[.]10780002022-02-252022-03-19
69.176.94[.]15680002022-02-252022-03-05
141.98.212[.]7090902021-10-052022-03-04
5.188.33[.]5080002022-02-152022-03-04
5.188.70[.]19380002022-02-152022-03-04
69.176.94[.]14080802022-02-242022-02-24
27.124.20[.]8380002022-02-142022-02-18
208.87.200[.]10680002022-01-022022-01-02
121.127.241[.]3780002021-12-082021-12-08
156.255.2[.]2114432021-10-052021-10-05
156.255.2[.]21180002021-10-042021-10-04
156.255.2[.]20380002021-10-032021-10-03
47.243.43[.]24880002021-07-052021-07-05
45.115.236[.]680802021-05-032021-06-01
43.251.118[.]9780002021-01-032021-03-01
185.243.43[.]13880002021-01-042021-02-02
47.245.59[.]3380002021-01-052021-01-05
  • On 1st April 2025, a search for SCOTCH ADMIN panels returned the following:
IP AddressPortFirst SeenLast Seen
104.194.152[.]2423332025-02-062025-02-27
172.86.80[.]12623332025-02-072025-02-27
154.90.59[.]6223332024-06-202024-09-20
154.90.59[.]8823332024-06-212024-09-20
154.90.58[.]21023332024-05-162024-06-14
154.90.59[.]22523332024-05-172024-06-13
38.60.199[.]20823332023-11-262024-01-09
38.60.199[.]25423332023-11-282024-01-09
38.60.199[.]9923332023-08-262023-11-21
38.60.199[.]4423332023-07-202023-09-11
194.163.34[.]234432022-09-302023-04-14
45.32.125[.]112104432022-10-012023-03-17
  • On 14th March 2024, a search for virtual SCOTCH ADMIN panels returned the following:
DomainIP Address
vsa.ahamar[.]com194.71.107[.]160
gates.chatonlineapp[.]com172.67.208[.]167
www.onlineweixin[.]net103.254.108[.]108
www.weetogether[.]top103.254.108[.]108
www.onlinewxapp[.]net103.43.18[.]43
www.unusualtransaction[.]com2.58.15[.]101
m.leak-news[.]com103.56.17[.]194
www.unusualtransaction[.]com46.246.98[.]209
www.lodepot[.]com62.72.58[.]168
www.online-wechat[.]com103.254.108[.]87

BADBAZAAR

DescriptionSSL certificate observed on BADBAZAAR C2s
MD5ee6e0fc26e94e5b2e52d57ac035b36ff
SHA-110f8806c72bf5d56efa41c430e8692d55dd49674
SHA-2561e72d5a908c6fcb4b59b65973ec8d4cf4c57b31e2b4973e72b8b85b4a 6a0b9f7
  • On 1st April 2025, a search for the above BADBAZAAR certificate returned the following:

IP addressPortFirst SeenLast Seen
65.108.192[.]173312372025-03-142025-03-28
65.108.192[.]173312362025-03-142025-03-28
65.108.192[.]173312352025-03-142025-03-28
157.90.129[.]73312362025-03-272025-03-27
142.132.131[.]15312362024-07-242025-03-27
142.132.131[.]15312352024-07-262025-03-27
142.132.131[.]20312372023-08-112025-03-27
142.132.131[.]15312372024-07-242025-03-27
142.132.131[.]20312362023-09-272025-03-26
142.132.131[.]20312352023-10-182025-03-26
65.108.192[.]155312362024-12-052025-02-20
65.108.192[.]155312372024-12-052025-02-20
65.108.192[.]155312352024-12-052025-02-19
23.88.28[.]222312372024-04-252024-11-29
23.88.28[.]222312352024-05-022024-11-28
23.88.28[.]222312362024-05-012024-11-28
212.129.21[.]168312352023-10-162024-03-17
212.129.21[.]168312372023-08-242024-03-17
212.129.21[.]168312362023-09-262024-03-14
DescriptionSSL certificate observed on BADBAZAAR C2s
MD546923e10db90bde295960851245f199a
SHA-187a3d3f9bb6c78a5e71cfdf9975ca6a083dd5ebc
SHA-25672e321bca1437eaf4a40b677cae5e09c5971fc3b972b11494712e62db3 db1baa
  • On 1st April 2025, a search for the above BADBAZAAR certificate returned the following:
IP AddressPortFirst SeenLast Seen
162.55.103[.]211201222023-01-122025-03-28
162.55.103[.]212201212022-06-302025-03-28
162.55.103[.]212201222023-07-142025-03-28
162.55.103[.]211201212022-06-032025-03-28
162.55.103[.]211201232023-07-222025-03-27
162.55.103[.]212201232023-07-222025-03-27
212.83.162[.]15290902022-10-132025-03-27
23.88.28[.]221204222023-07-282023-09-30
23.88.28[.]221204212023-05-182023-09-28
23.88.28[.]221204232023-07-282023-09-28
162.55.103[.]210201212022-09-302023-02-23
65.21.92[.]67201212021-11-022022-10-13
65.21.92[.]67201222022-08-102022-10-13
23.88.28[.]220201212021-12-082022-05-13
94.130.92[.]230201212021-01-042021-10-05
88.99.150[.]246201212021-04-062021-09-08
45.76.132[.]91201212021-02-022021-03-01
  • WHOIS domains

Below is a table of domains which currently or historically have WHOIS records with values that match those observed in BADBAZAAR C2 domains.

WHOIS ValueDomains
Registrant State: UJYJYUJ
Registrant Country: Bolivia
Registrar: eNom
  • ntc-mobile[.]com
  • microtik[.]net
  • ntc-ftth[.]net
  • axisupdating[.]com
  • axisupdate[.]com
  • telegramrouter[.]org
  • telegramtor[.]om
  • fufijxgkg[.]com
  • jindjjdtc[.]com
  • tubevideoplus[.]org
  • thetubeplus[.]com
  • tbgram[.]org
  • signalplus[.]org
  • pmumail[.]com
Registrant State: REWR
Registrant Country: Central African
Republic Registrar: eNom
  • yumoftion[.]com
  • fvbyavgyea[.]com
  • jkiohreh[.]com
  • pmstwocqn[.]com
  • ofsggcccreq[.]com
  • verifyss[.]com
  • tooenabled[.]com
  • suguestions[.]com
  • searching2[.]com
Registrant State: FSDF
Registrant Country: Albania
Registrar: eNom
  • tryhrwserf[.]com
  • tibetone[.]org
  • comeflxyr[.]com
  • adoptewer[.]com
  • bhvghg[.]com
  • fgttgvh[.]com
  • in7n[.]com
  • o21q[.]com
  • ophgfhfgt7[.]com
Email Addresses
taoyujun@gmail.com
tplutalova@list.ru
wangminghua6@gmail.com
choekyi.wangmo@ignitetibet.net
ivan_s81@mail.ru
ocean.nio@rediffmail.com
YouTube Channels
https://www.youtube.com/@flygram1665
https://www.youtube.com/@bradshannon334
https://www.youtube.com/@uyghurapks3096
https://www.youtube.com/@josephjoey3499

The following are links to other indicators of compromise (IoCs) associated with BADBAZAAR and MOONSHINE. The NCSC cannot confirm the validity of all the information in these links and readers are advised to independently verify their accuracy and relevance:

Mitigation

The NCSC encourages adoption of the recommendations below to defend against the threats described in the case studies.

Appendix

MOONSHINE & BADBAZAAR samples observed

The table below lists the apps used in MOONSHINE and BADBAZAAR campaigns in the past two years.

Many of these apps show a clear similarity to established apps. This is likely to be a deliberate actor technique to 'spoof' well-known brands.

It’s important to note, the app title, package name, and app icon can all imitate or match the real application and should therefore not be used exclusively to identify if a device is infected.

App titlePackage nameApp icon
99 Names of ALLAHcom.Apptriple.Namesofallah.Asmaulhusna
APKPurecom.apkpure.aegon
Adobe Acrobatcom.adobe.reader
Alpine(پښتو)psyberia.pa.full
AlpineQuest Off-Road Explorerpsyberia.alpinequest.full
AlpineQuest Off-Road Explorerpsyberia.alpinequest.full
AlpineQuest Off-Road Explorer (Lite)psyberia.alpinequest.free
AppLockcom.alpha.applock
Arabic Keyboardcom.arabic.keyboard.arabic.language.keyboard.app
Audio Video Cutterbsoft.com.mp3.cutter.ringtone.video.maker.trimmer
Badam维语输入法com.ziipin.softkeyboard
Buddhist Songs (1)com.bigkidsapps.buddhistsongs1
Calculatorcom.android2.calculator3
Compass 360 Procom.pro.app.compass
EN-UG Dictionary Freeru.vddevelopment.ref.enugen.free
Ewladewlat.com.ewlatuyghur
FASTcom.netflix.Speedtest
FMWhatsAppcom.fmwhatsapp
File Manager +com.alphainventor.filemanager
FlyGram/Flygramorg.telegram.FlyGram
Free WiFi Passcom.cl.wifipassword.share
GBWhatsAppcom.gbwhatsapp
Hefz Qurancom.golap.hefzquran
Hijri Calendarcom.ibrahim.hijricalendar
InShotcom.camerasideas.instashot
KMPlayercom.kmplayer
KineMastercom.nexstreaming.app.kinemasterfree
MP3 Cutter & Ringtone Makerringtone.maker.mp3.cutter.audio
Malloccom.mallocprivacy.antistalkerfree
Maps Distance Calculatorcom.routemap.mapdownload.gpsrouteplanner
Media Recoverycom.aaa.media.recovery.androidapp
Nur.cncom.nur.reader
Nur输入法com.nur.ime
OGWhatsAppcom.gbwhatsapp3
PDF Extracom.mobisystems.mobiscanner
PDF Readerpdf.pdfreader.pdfviewer.pdfeditor
PDF Readercom.gappstudios.autowifi3gdataswitch.san.basicpdfviewer
Photo Editorcom.iudesk.android.photo.editor
Photo Recoveryrecover.restore.undelete.photo.video.file
Photo Studiocom.kvadgroup.photostudio
Plusorg.telegram.pluspro
Prayer Bookcom.arashpayan.prayerbook
QuarkVPNcom.speedy.vpn
Qurancom.tos.quranuighore
QuranKerimcom.ewlat.qurankerim
Restore Deleted Picscom.restore.deleted.pictures.video
Signalorg.thoughtcrime.securesms
Signal Plusorg.thoughtcrime.securesmsplus
SignalPlusorg.thoughtcrime.securesmsplus
Singing Bowl Sounds HDcom.soundjabber.tibetansingingbowls.candletibet.bowlschakrasound
Skypecom.skype.raider
Snaptubecom.snaptube.premium
Snaptube Pluscom.snaptube.gold
SwiftKey Keyboardcom.touchtype.swiftkey
Tarteelcom.mmmoussa.iqra
Telegramorg.zhifeijihj.messenger
Telegramorg.telegramfbo.messenger
Telegram Xorg.thunderdog.challegram
Tibetan Divination System MOnet.rhombapp.mo
Tibetan Prayercom.chorig.tibetanprayer
Translator AR-TRfree_translator.artr
Truecallercom.truecaller
TubePluscom.techshop.videocraft
Ultrasurfus.ultrasurf.mobile.ultrasurf
Uyghur Keyboardcom.mykeyboard.myphotokeyboard.uyghurkeyboard
Uyghurche Kirguzguchcom.ziipin.softkeyboard
Video Convertercom.inverseai.video_converter
Video Cuttercom.naing.cutter
Video Downloaderdownloader.video.download.free
Video Makercom.bstech.slideshow.videomaker
Video Player for Androidcom.zgz.supervideo
Viekacom.prime.story.android
VivaVideo Litecom.quvideo.vivavideo.lite
VivaVideo PROcom.quvideo.xiaoying.pro
Vmuslimcom.alhiwar
Voice Recordercom.media.bestrecorder.audiorecorder
Voxercom.rebelvox.voxer
Weather Forecastcom.graph.weather.forecast.channel
WhatsAppcom.whatsapp
WhatsAppcom.whatsapp
WhatsAppcom.WhatsApp3Plus
WhatsAppcom.whatsapp
WhatsAppcom.WhatsApp2Plus
Whoscallgogolook.callgogolook2
WiFi Password Master_v1.4com.example.dat.a8andoserverx
Windycom.windyty.android
Wisecom.transferwise.android
YoWhatsAppcom.yowhatsapp
YouTube Downloaderdentex.youtube.downloader
Zomim.zom.messenger
iQuran Litecom.guidedways.iQuran
ئاۋازلىق ئەسەرلەرcom.ewlat.eserler
ئاۋازلىق قۇرئانcom.c9.utilim
ئىزچىcom.yelken.izchi
ئۇيغۇرچە APK ئىزدىگۈچىcom.uygur.apkstore
ئۇيغۇرچە قۇرئانcom.c9.uyghurquran
القرآن الكريمcom.maher4web.quran
زىكىرلەر com.my.newproject5
قۇرئان كەرىمru.omdevelopment.ref.quranuyghur.free
كۇھىقاپ لۇغىتىcom.kuhiqap.lughitim
نۇر كىرگۈزگۈچcom.nur.ime
《心灵法门》念佛机com.guanyincitta.chant
汉藏英辞典com.dacd.dictionary
藏历基本数据com.example.astronomicalcalendarapp
阳光藏汉翻译com.tibetan.translate

Further reading

Guidance from the Australian Cyber Security Centre

Guidance from the UK NCSC and NPSA

Guidance from the US NSA

Disclaimer

Please note that this advisory provides information that is validated at the time of publication.

This report draws on information derived from authoring agency and industry sources. Any findings and recommendations made have not been provided with the intention of avoiding all risks and following the recommendations will not remove all such risk. Ownership of information risks remains with the relevant system owner at all times.

In the UK, this information is exempt under the Freedom of Information Act 2000 (FOIA) and may be exempt under other UK information legislation.

Refer any FOIA queries to ncscinfoleg@ncsc.gov.uk.

Was this information helpful?

Thanks for your feedback!

Optional

Tell us why this information was helpful and we’ll work on making more pages like it