Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Tall Tales: How Chinese Actors Use Impersonation and Stolen Narratives to Perpetuate Digital Transnational Repression

0
Medium
Published: Tue Apr 28 2026 (04/28/2026, 07:09:29 UTC)
Source: AlienVault OTX General

Description

In collaboration with the International Consortium of Investigative Journalists (ICIJ), two distinct actor clusters aligned with the People's Republic of China were identified targeting journalists and civil society members. GLITTER CARP conducted widespread credential harvesting campaigns against Uyghur, Tibetan, Taiwanese, and Hong Kong diaspora activists, as well as journalists covering these communities, employing digital impersonation and fake security alerts while frequently reusing infrastructure. SEQUIN CARP specifically targeted journalists involved in ICIJ's China Targets investigation using sophisticated OAuth consent phishing attacks with well-developed personas based on co-opted narratives, though operational mistakes revealed poor persona management. Both campaigns demonstrate China's Military-Civil Fusion system leveraging private contractors to conduct digital transnational repression at scale, with targeting intensifying following the China Targets publication that exposed Chinese governme...

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/28/2026, 14:37:52 UTC

Technical Analysis

Two Chinese-aligned actor clusters, GLITTER CARP and SEQUIN CARP, conduct targeted digital repression against journalists and activists linked to Uyghur, Tibetan, Taiwanese, and Hong Kong diaspora communities. GLITTER CARP focuses on credential harvesting using impersonation and fake security alerts, often reusing infrastructure. SEQUIN CARP targets journalists involved in the ICIJ China Targets investigation with OAuth consent phishing attacks using personas crafted from stolen narratives. These campaigns illustrate the use of private contractors under China's Military-Civil Fusion system to perform large-scale digital repression. Operational errors in persona management were observed in SEQUIN CARP's activities. The campaigns intensified following public exposure by investigative journalism. This is a social engineering and credential theft threat rather than a software vulnerability, with no patches or exploits applicable.

Potential Impact

The campaigns result in credential theft and potential unauthorized access to accounts of targeted journalists and activists, enabling digital transnational repression. This undermines privacy, freedom of expression, and safety of targeted individuals. The impact is significant for affected communities but does not involve exploitation of software vulnerabilities or widespread malware propagation. No known exploits in the wild have been reported.

Mitigation Recommendations

No patches or official fixes are applicable as this threat involves social engineering and credential harvesting rather than software vulnerabilities. Defenders should focus on user awareness training about phishing and impersonation tactics, implement strong multi-factor authentication, and monitor for suspicious OAuth consent requests. Since this is a targeted campaign, organizations supporting at-risk communities should increase vigilance and incident response readiness. Patch status is not applicable.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://citizenlab.ca/research/how-chinese-actors-use-impersonation-and-stolen-narratives-to-perpetuate-digital-transnational-repression/"]
Adversary
null
Pulse Id
69f05d291d899793ddba04f9
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainyoutubenet.com
domainsharelinks.info
domainmercatdegirona.com
domainhsf898.com
domainifans.online
domainmyidsafety.com
domainentrnow.com
domainoauth-api.com
domainpornhub-net.com
domainpersonalsafezone.com
domainpassionateboomers.com
domainmyacceshub.com
domainsctapi.ftqq.com
domainacesportal.com
domain1drv.one
domainaccntcntr.com
domainaccountcentar.com
domainaccpanelcenter.com
domainbrighterora.com
domaincoincarp.cash
domaindeeporbiton.com
domainfileprev.com
domainfileprev.info
domaingitlab-ai.com
domainlogncntr.com
domainodsync.live
domainodview.live
domainprofileub.com
domainsetuppanel.com
domainsigninacesspoint.com
domainusercontropanel.com
domainuserpref.com
domainusrkonnect.com
domainuzrconnect.com
domainaccopanel.com
domainacctune.com
domainacespoint.com
domainakountcenter.com
domainakounthub.com
domainauthinityapp.com
domainbreachforums.fit
domainbrowsernotifications.info
domainchinadigitaltime.net
domainconfigalign.com
domainconfiguramgr.com
domaincontrohub.com
domaincontrolprofile.com
domaincoupangrank.kr
domaindentialvault.com
domainentgate.com
domainentpoinat.com
domainentruhub.com
domainentryfortify.com
domainentrzone.com
domainepechtimes0.org
domainevtreview.com
domainfeelitnov.com
domaingearhelix.com
domaingivemethedge.com
domaingnews.news
domaingoogle-document.com
domainguardaccount.com
domainguidefixit.com
domainicjiorg.org
domainidenthubs.com
domainidentihive.com
domaininterfacily.com
domainivycemnp.com
domainlgtymp.fit
domainlineman.live
domainlineme.live
domainlinkshub.info
domainlogifycenter.com
domainloginnetal.com
domainloginshiled.com
domainlogncenter.com
domainmegaview.click
domainmemburcenter.com
domainmlinks.info
domainmmbrhub.com
domainneuralgiavista.com
domainnovamecha.com
domainoauth2-signal.com
domainocspilots.com
domainodsync.cloud
domainoneclickautht.com
domainopenlabc.com
domainprofilemgr.com
domainprofilesetop.com
domainprofilesetup.com
domainproflcntr.com
domainprotectehub.com
domainredi.ink
domainsecureagate.com
domainsharedrive.cloud
domainshowthetrick.com
domainsiginpro.com
domainsignalgroup.me
domainsigncenterr.com
domainsigninacessint.com
domainsignivaullt.com
domainsignncenter.com
domainstartentry.com
domainsyandbly.online
domaintelegra.live
domaintouzhele.fun
domainuseracess.com
domainuseradjust.com
domainuserconsola.com
domainusergateaccess.com
domainuserhubz.com
domainuserhup.com
domainuserpanell.com
domainuserportl.wine
domainuseverifcation.com
domainusrcntr.com
domainuzrcenter.com
domainuzrconect.com
domainverifcredentia.com
domainvibshare.me
domainvoinewz.com
domainvonxnews.com
domain2fa.web.oauth2-signal.com
domaina.web.oauth2-signal.com
domainepochtimes.entryfortify.com
domainglobalobject.console.info

Url

ValueDescriptionCopy
urlhttps://sctapi.ftqq.com
urlhttps://a.web.oauth2-signal.com
urlhttps://a.web.oauth2-signal.com/gm-oauth2-callback
urlhttps://megaview.click/pdf_to_scilla
urlhttps://sctapi.ftqq.com:443/SCT269149TJZWARwQ76bEWeM6Vjrgih583.send?title=Gmail&desp=3D[TARGET
urlhttps://sctapi.ftqq.com:443/SCT96188ToxRyYX7UWYhASIGRXfL7AAzv.send?title=Gmail&desp=Mozilla%2F5.0%20

Threat ID: 69f0c280cbff5d86101cb5f2

Added to database: 4/28/2026, 2:21:52 PM

Last enriched: 4/28/2026, 2:37:52 PM

Last updated: 4/29/2026, 4:47:38 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses