A recently exposed malware campaign using critical attacks to target iPhone users for more than two years would apparently be part of efforts to track Uyghur Muslims based in Xinjiang state in China.

The campaign was actually larger than expected, and also attempted to infect Android and Microsoft Windows devices.

Citing sources knowledgeable about this, TechCrunch said last weekend that the campaign in question was the work of a state actor – most likely the Chinese government, which has been seeking for years. years to closely monitor his Uighur minority group.

Forbes will then confirm the findings of TechCrunch, indicating that the campaign was also designed to infect Android devices and Windows PCs. A spokesman for Microsoft reportedly told Forbes that the research team that had discovered and made public the malware operation "was very accurate in his blog post that recently released attacks use unique exploits on iPhone and did not reveal similar information to us. " do not comment on his Android operating system.

Google's Project Zero researchers revealed last week the iPhone part of the anti-malware operation, which was trying to infect device users with a malware implant, exploiting the exploits provided via a small number of malware. compromised websites. In total, Google's Threat Analysis Group (TAG) has identified five distinct iPhone operating chains, ranging from iOS 10 to the latest version of iOS 12.