[Posted on October 9, 2014 by Steven Adair](http://www.volexity.com/blog/?p=33) Over the last few months, Volexity has been tracking a particularly remarkable advanced persistent threat (APT) operation involving strategic web compromises of websites in Hong Kong and Japan. In both countries, the compromised websites have been particularly notable for their relevance to current events and the high profile nature of the organizations involved. In particular the [Hong Kong compromises appear to come on the heels of the Occupy Central Campaign shifting into high gear. These](https://en.wikipedia.org/wiki/Occupy_Central_with_Love_and_Peace) compromises were discovered following the identification of malicious JavaScript that had been added to legitimate code on the impacted websites. This code meant that visitors were potentially subjected to exploit and malicious Java Applets designed to install malware on their systems. While investigating these cases, Volexity also discovered additional APT attack campaigns involving multiple other pro-democratic websites in Hong Kong. These attempts at exploitation, compromise, and digital surveillance are detailed throughout this post. # Compromised Pro-Democratic Hong Kong Websites Warning: Many of these websites may still be compromised and present a risk to visitors. Browse with caution. **Alliance for True Democracy – Hong Kong** Over the last two days, Volexity has observed malicious code being served up from the website of the Alliance for True Democracy (ATD) in Hong Kong (www.atd.hk). ATD is an alliance of people and organizations dedicated to democracy and universal suffrage in Hong Kong. At the time of this writing malicious code is still live on the website, so please visit with care until the website is clean. Below is a screen shot of the malicious code references found pre-pended to a JavaScript file on the website named **superfish.js.** This JavaScript file is called from other parts of the website and effectively nests the loading of additional JavaScript written and interpeted as: **