Hack-for-hire spyware campaign targets journalists in Middle East, North Africa
An apparent hack-for-hire campaign from a group with suspected Indian government connections targeted Middle Eastern and North African journalists and activists using spyware, three collaborating organizations said in reports published Wednesday.
The attacks shared infrastructure that pointed to the advanced persistent threat group known as Bitter, which most frequently targets government, military, diplomatic and critical infrastructure sectors across South Asia, according to conclusions from researchers at Access Now, Lookout and SMEX.
Each group took on a different piece of the puzzle:
- Access Now got calls on its helpline that led it to examine a spearphishing campaign in 2023 and 2024. It contacted Lookout for technical support about the malware it encountered.
- Lookout attributed the malware to Bitter, concluding it was a likely hack-for-hire campaign, using the Android ProSpy spyware.
- SMEX dived into a spearphishing campaign targeting a prominent Lebanese journalist last year, collaborating with Access Now to discover shared infrastructure between the campaigns.
One of the victims, independent Egyptian journalist Mostafa Al-Aβsar, said he contacted Access Now after receiving a suspicious link from someone heβd been talking to about a job position. He was skeptical because his phone had been targeted before, when he was arrested in Egypt in 2018.
The lesson for journalists and civil society groups is that cybersecurity βis not a luxury,β he said.
βI feel like Iβm threatened,β Al-Aβsar said, and even though he was living in exile, he feels like βthey are still following me. I also felt worried about my family, about my friends, about my sources.β
The combined research found a wider campaign than just the original victims.
βOur joint findings expose an espionage campaign that has been operational since at least 2022 until present day primarily targeting civil society members and potentially government officials in the Middle East,β Lookout wrote. βThe operation features a combination of targeted spearphishing delivered through fake social media accounts and messaging applications leveraging persistent social engineering efforts, which may result in the delivery of Android spyware depending on the targetβs device.β
The Committee to Protect Journalists condemned the campaign.
βSpying on journalists is often the first step in a broader pattern of intimidation, threats, and attacks,β said the groupβs regional director, Sara Qudah. βThese actions endanger not only journalistsβ personal safety, but also their sources and their ability to do their work. Authorities in the region must stop weaponizing technology and financial resources to surveil journalists.β
Access Now said it didnβt have enough information to attribute who was behind the attacks it identified.
ESET first published research on the ProSpy malware last year, after finding it targeting residents of the United Arab Emirates.
The post Hack-for-hire spyware campaign targets journalists in Middle East, North Africa appeared first on CyberScoop.
