As if tear gas and the "Great Firewall of China" weren't enough to deal with, it now appears that Hong Kong protesters' cellphones are being targeted by a highly sophisticated kind of malware possibly originating in China. The "Xsser mRAT" malicious software, which once installed can access practically everything on a phone, was discovered by Lacoon, an Israeli cyber-security outfit. In a blog post, the experts explain that it's aimed at iOS users, and is related to malware that began targeting Android users in Hong Kong last week. This cross-platform targeting suggests a powerful adversary like a government is behind it, and the use of Chinese code in the malware's central servers suggests which government it most likely is, Lacoon says. China has already targeted mobile users by blocking Instagram, censoring messages in apps like WeChat and blocking searches on Baidu. So far there is no evidence that the iOS version of Xsser has reached the wild; it was discovered in non-operational form and had to be installed by the security experts manually, but a "weaponized" version could be in the works.
More from NBC News:
Close to Home: First Case of Ebola Diagnosed in U.S., CDCConfirms
Tracy Morgan 'Can't Believe' Walmart Blames Him for Injuries
Kurds Drive ISIS From Key Border Crossing
Read MoreHong Kong activists stare down 'Great Firewall of China'
Fake #OccupyCentral #Code4HK app targets activists' smartphones with #spyware http://www.scmp.com/news/hong-kong/article/1594667/fake-occupy-central-app-targets-activists-smartphones … via SCMP_News
Fake Code4HK Mobile App http://www.vxsecurity.sg/2014/09/30/technical-tear-down-fake-code4hk-mobile-app/ …