Chinese state-backed hackers increase attacks against Uyghur Times
3 min readBy Uyghur Times Editorial Team
The Chinese government has a long record of attacking Uyghur groups in the diaspora.
World Uyghur Congress and Uyghur Human Rights Project have published multiple press releases on Chinese cyberattacks targeting their websites and servers.
Uyghur Times, an independent media organization founded by Uyghurs to speak about Uyghurs, has been one of the targets of Chinese cyberattacks since its foundation in 2018.
Uyghur Times, along with other Uyghur websites, went through another round of Chinese cyberattacks in September 2019, according to Volexity, a Washington-based cybersecurity firm. In its September 2019 blog post, Volexity stated that cyberspace is becoming a battleground for the Uyghurs. The post specifically mentioned three websites of the Uyghur Times: the English, Uyghur, and Chinese main index. These days the level of Chinese surveillance against Uyghurs extends well beyond their borders and has entered the digital realm.
The mainstream media such as CNN, PC Magazine, TechCrunch, and many other media outlets reported the news of the Chinese cyberattack against Uyghur groups.
Google and Apple also warned their users against the virus that the Chinese hackers had used to attack Uyghur Times websites. As a result, the Uyghur Times decided to abandon the WordPress CMS and instead create its own CMS.
Starting from January 10, 2022, we have seen more cyberattacks by unknown hackers aimed at the main index of the English and Chinese websites of the Uyghur Times. Hundreds of thousands of unidentified visitors have burdened the server of the Uyghur Times, VOA reports. This attack targeted most of the Uyghur groups and other American media organizations.
Mr. Koznak, the chief technical officer of the Uyghur Times, told us that “The types of cyber attacks we have received recently include DoS and DDoS attack, phishing attack, E-mail server attack, and ransomware attacks. As a result, they have managed to stop the server briefly a few times. We took quick and strong measures to protect our server and data security, as well as the privacy of our visitors. We are pretty sure that it is the nature of the Chinese authorities to continue to attack the code of our websites, generate mass fake visitors to steal data, and add a burden on our server.”
In May 2021, Over fifty Chinese media platforms such as Global Times (环球时报), Sina, QQ, and 163 published defamatory reports about Uyghur Times and its founder Tahir Imin, lies created by the Chinese government mouthpiece Global Times. Their purpose is to create strife between Uyghurs and other Muslims.
The Chinese government has also attempted to portray Tahir Imin, the founder of Uyghur Times, as a separatist and an “East Turkistan” element that spreads lies about China. According to China News Service, one of China’s state-owned media outlets, in a report published on April 9 under the headline “Xinjiang Official: Exposing the ‘Databases’ Fabricated by Anti-China Forces and Letting the Truth Be Known to the World,” Xu Guixiang, spokesperson for the People’s Government of the Xinjiang Uyghur Autonomous Region, claimed that in recent years certain “anti-China forces” in the international community had fabricated so-called “Xinjiang Data Project,” “Xinjiang Victims Database,” and “Uyghur Transitional Justice Database,” collecting what he described as false “witness testimonies” in an attempt to confuse truth with lies, smear Xinjiang, and deceive the world.
In the same article, Chinese authorities accused an American researcher, Gene Bunin, of establishing the “Xinjiang Victims Database” together with what the report called anti-China “experts,” including Darren Byler, Zhao Loulan, Fatima Abduelghafur, and Tahir Imin, whom the article labeled as an “East Turkistan element.” The report further alleged that the project had received funding and support from the United States, Australia, and other countries.
Discover more from Uyghur Times
Subscribe to get the latest posts sent to your email.