Threat IntelHIGH

Hack-for-Hire Spyware Campaign Targets Journalists in MENA

Featured image for Hack-for-Hire Spyware Campaign Targets Journalists in MENA
#Bitter#ProSpy#Access Now#Lookout#SMEX

Original Reporting

CSCyberScoop·Tim Starks

AI Intelligence Briefing

CyberPings AI·Reviewed by Rohit Rana
Severity LevelHIGH

High severity — significant development or major threat actor activity

🎯
🎯 THREAT ACTOR PROFILE
Threat Actor / APT GroupBitter
Aliases
AttributionSuspected Indian government connections
Target SectorsMedia, Civil Society
Target RegionsMiddle East, North Africa
Active Since2022
Campaign NameProSpy Campaign
Primary TTPsSpearphishing, Social Engineering
Tools UsedProSpy
MITRE ATT&CKT1566.001 (Spearphishing Attachment)
MotivationEspionage
🎯

A group of hackers is using fake messages to trick journalists in the Middle East and North Africa into giving up their personal information. This is a serious problem because it puts journalists at risk and threatens the freedom of the press.

Quick Summary

A hack-for-hire spyware campaign linked to the Bitter group is targeting journalists in the MENA region, with new reports revealing specific victims among Egyptian journalists. This raises serious concerns for press freedom.

What Happened

A disturbing hack-for-hire spyware campaign has emerged, targeting journalists and activists across the Middle East and North Africa. This operation is suspected to be linked to the Bitter group, which has ties to the Indian government. Researchers from Access Now, Lookout, and SMEX collaborated to uncover the details of this ongoing espionage campaign. Recent findings indicate that two prominent Egyptian journalists were specifically targeted in a sophisticated spearphishing campaign that began in October 2023.

Who's Behind It

The Bitter group is known for its sophisticated cyber operations, primarily targeting government and military sectors in South Asia. Recent findings indicate that they are now extending their reach into the Middle East, focusing on civil society members, including journalists. The campaign employs advanced social engineering tactics, particularly through spearphishing, to deliver malicious software. The attackers are believed to have ties to Asia, although the exact location remains uncertain.

Tactics & Techniques

The attacks utilize ProSpy, an Android spyware, delivered via phishing links sent through fake social media accounts and messaging applications. Victims are often lured into clicking these links under the guise of job opportunities or other enticing offers. For instance, independent journalist Mostafa Al-A’sar received a suspicious link from a contact about a job, which he recognized as a potential threat given his previous targeting in 2018. Additionally, the attackers employed phony account profiles and messages, masquerading as legitimate services, including Apple and Signal, to deploy the malware.

New Victims

The recent report highlights two Egyptian journalists, Mostafa Al-A’sar and Ahmed Eltantawy, who were targeted through elaborate spearphishing tactics. Al-A’sar, a human rights defender, previously spent almost four years in an Egyptian prison before fleeing the country. Eltantawy, a critical voice against the Egyptian government, had planned to run against President Abdel Fattah al-Sisi but withdrew after facing severe repercussions. Both journalists received messages designed to extract their account credentials, but fortunately, neither account was ultimately compromised due to suspicious notifications.

Defensive Measures

The findings from this research highlight the urgent need for journalists and civil society groups to prioritize cybersecurity. As Al-A’sar pointed out, cybersecurity is not a luxury; it is essential for their safety and the integrity of their work. Organizations like the Committee to Protect Journalists have condemned these actions, emphasizing that spying on journalists can lead to broader patterns of intimidation and threats. Marwa Fatafta, a director at Access Now, stressed the importance of vigilance, stating that spear-phishing attacks serve as a cheaper alternative to spyware, raising alarms for journalists in the region to enhance their digital practices.

Conclusion

This espionage campaign has been operational since at least 2022 and continues to pose a significant threat to press freedom in the region. The collaboration between Access Now, Lookout, and SMEX has shed light on the tactics used by Bitter, underscoring the importance of vigilance and protective measures in the face of such threats.

🔍 How to Check If You're Affected

  1. 1.Monitor communications for suspicious links or attachments.
  2. 2.Educate team members on recognizing phishing attempts.
  3. 3.Implement endpoint protection to detect and block spyware.

🏢 Impacted Sectors

MediaTechnology

🗺️ MITRE ATT&CK Techniques

Pro Insight

The emergence of targeted spearphishing campaigns against journalists underscores the increasing sophistication of cyber threats in the MENA region. Journalists must adopt robust cybersecurity practices to protect themselves from these evolving threats.

🗓️ Story Timeline

Story broke by CyberScoop
Covered by The Record

Sources

Original Report

CSCyberScoop· Tim Starks
Read Original

Also covered by

THThe Record

Two prominent Egyptian journalists targeted with elaborate spearphishing campaign

Read

Related Pings

HIGHThreat Intel

Minnesota National Guard Deployed After Cyberattack Disrupts Services

A cyberattack on Winona County's critical systems prompted swift action from Minnesota's governor. The National Guard is now deployed to assist recovery efforts. Residents should stay alert for updates and potential phishing scams.

The Record·
HIGHThreat Intel

TeamPCP Supply Chain Campaign - Cisco Source Code Stolen

The TeamPCP campaign has escalated with the theft of Cisco's source code linked to Trivy. This raises serious security concerns for affected organizations. Stay updated on protective measures and developments.

SANS ISC·
HIGHThreat Intel

CIA Elevates Cyber Espionage Division for Enhanced Operations

The CIA has elevated its cyber espionage division to a full mission center, enhancing its capabilities against digital threats. This strategic move reflects a commitment to bolster national security in cyberspace. With increased resources, the agency aims to stay ahead of foreign adversaries and improve its cyber operations.

The Record·
HIGHThreat Intel

Forest Blizzard - Launches AiTM Attacks Targeting Outlook

Forest Blizzard is exploiting router vulnerabilities to launch AiTM attacks on Outlook sessions. Over 200 organizations are affected, raising serious security concerns. Experts urge immediate action to secure home networks.

CSO Online·
HIGHThreat Intel

North Korean Threat Actors - Insider Threat Tactics Revealed

North Korean cyber actors are using AI and fake identities to infiltrate companies. This poses a serious insider threat that organizations must address. Learn how to protect your business.

Group-IB Blog·
HIGHThreat Intel

Cybercriminals Move Deeper into Networks, Hiding in Edge Infrastructure

Cybercriminals are increasingly using edge infrastructure to hide their activities. This shift poses significant risks as traditional security measures often overlook these areas. Enhanced threat intelligence is crucial for early detection and prevention.

Help Net Security·