{"id":551,"date":"2026-04-09T15:14:29","date_gmt":"2026-04-09T15:14:29","guid":{"rendered":"https:\/\/thedigitalfortress.us\/?p=551"},"modified":"2026-04-09T15:14:29","modified_gmt":"2026-04-09T15:14:29","slug":"bitter-linked-hack-for-hire-campaign-targets-journalists-across-mena-region","status":"publish","type":"post","link":"https:\/\/thedigitalfortress.us\/?p=551","title":{"rendered":"Bitter-Linked Hack-for-Hire Campaign Targets Journalists Across MENA Region"},"content":{"rendered":"<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjlfEPPxKdPdQANFPwRrggWpWL4wPe22B_Hdr5FpqDGHKTwN95xiQVwqqN896q_CkYvn-wrbDTXMl6wZ_aMD0YwEyRAI_9lzSZj_cg9-RhoNXMh-j16cA0n4CIT5y29FkOWFrQoV8oCv5OtZhMlhAKwqcgirImTOXoVzsJY76y6l-EWn86dAJfYNBy1ejW4\/s1700-e365\/phone-hacking.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><\/a><\/div>\n<p>An\u00a0apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA), according to findings\u00a0from <a href=\"https:\/\/www.accessnow.org\/mena-phishing-2026\/\">Access\u00a0Now<\/a>, <a href=\"https:\/\/www.lookout.com\/threat-intelligence\/article\/bitter-hack-for-hire\">Lookout<\/a>,\u00a0and <a href=\"https:\/\/smex.org\/smex-may2025\/\">SMEX<\/a>.<\/p>\n<p>Two\u00a0of the targets included prominent Egyptian journalists and government critics, Mostafa Al-A&#8217;sar and Ahmed Eltantawy, who were at the receiving end of a series of spear-phishing attacks that sought to compromise their Apple and Google accounts in October 2023 and January 2024 by directing them to fake pages that tricked them into entering their credentials and two-factor authentication (2FA)\u00a0codes.<\/p>\n<p>\u00abThe attacks were carried out from 2023 to 2024, and both targets are prominent critics of the Egyptian government who have previously faced political imprisonment; one of them was previously targeted\u00a0with spyware,\u00bb Access Now&#8217;s Digital Security Helpline\u00a0said.<\/p>\n<p>Also\u00a0singled out as part of these efforts was an anonymous Lebanese journalist, who received phishing messages in May 2025 through the Apple Messages app and WhatsApp containing malicious links that, when clicked, tricked users into entering their account credentials as part of a supposed verification step from\u00a0Apple.<\/p>\n<p>\u00abThe phishing campaign included persistent attacks via iMessage\/Apple Messenger and WhatsApp app, [&#8230;] impersonating Apple Support,\u00bb SMEX, a digital rights non-profit in the West Asia and North Africa (WANA) region, said. \u00abWhile the main focus of this campaign appears to be Apple services, evidence suggests that other messaging platforms, namely Telegram and Signal, were also targeted.\u00bb<\/p>\n<p>In\u00a0the case of Al-A&#8217;sar, the spear-phishing attack aimed at compromising his Google account began with a LinkedIn message from a sock puppet persona named \u00abHaifa Kareem,\u00bb who approached him with a job opportunity. After\u00a0the journalist shared their mobile number and email address with the LinkedIn user, he received an email from the latter on January 24, 2024, instructing him to join a Zoom call by clicking on a link shortened using Rebrandly.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/vpn-risk-report-inside-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgWajeG0cdaapf1GKTZRUZUB7BzuYGegyw5k0eAorJXlmkFdYCCeLXXhXYJuXU9lWD33rV6rRnIyly3czoNfYifpxk1eGA5slItPmim3HkubXoQMgC4J7hdQPywxGbWq7Eqeff_o6s2Fq-WmSFd5guwdLn7IqpveMqULqtVnd-ndnljWYGj45EkMFB7m0qm\/s728-e100\/z-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The\u00a0URL is assessed to be a consent-based phishing attack that leverages Google&#8217;s OAuth 2.0\u00a0to grant the attacker unauthorized access to the victim&#8217;s account through a malicious web application named \u00aben-account.info.\u00bb<\/p>\n<p>\u00abUnlike the previous attack, where the attacker impersonated an Apple account login and used a fake domain, this attack employs OAuth consent to leverage legitimate Google assets to deceive targets into providing their credentials,\u00bb Access Now\u00a0said.<\/p>\n<p>\u00abIf the targeted\u00a0user is not logged\u00a0in to Google, they are prompted to enter their credentials (username and password). More\u00a0commonly, if the\u00a0user is already logged\u00a0in, they are prompted to grant permission to an application that the attacker controls, using a third-party sign-in feature that is familiar to most Google\u00a0users.\u00bb<\/p>\n<p>Some of the domains used in these phishing attacks are listed below\u00a0&#8211;<\/p>\n<ul>\n<li>signin-apple.com-en-uk[.]co<\/li>\n<li>id-apple.com-en[.]io<\/li>\n<li>facetime.com-en[.]io<\/li>\n<li>secure-signal.com-en[.]io<\/li>\n<li>telegram.com-en[.]io<\/li>\n<li>verify-apple.com-ae[.]net<\/li>\n<li>join-facetime.com-ae[.]net<\/li>\n<li>android.com-ae[.]net<\/li>\n<li>encryption-plug-in-signal.com-ae[.]net<\/li>\n<\/ul>\n<p>Interestingly, the use of the\u00a0domain\u00a0\u00abcom-ae[.]net\u00bb overlaps with an Android spyware campaign\u00a0that Slovakian cybersecurity company ESET documented in October\u00a02025, highlighting the use\u00a0of deceptive websites impersonating Signal, ToTok, and Botim to\u00a0deploy <a href=\"https:\/\/thehackernews.com\/2025\/10\/warning-beware-of-android-spyware.html\">ProSpy and\u00a0ToSpy to unspecified targets in the\u00a0U.A.E.<\/p>\n<div class=\"separator\" style=\"clear: both;\"><a href=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhS7OCI8Zb-SSXu1DasAgAbi0gFWklPhGg3Mrm5Jzgb5lulolangOHpi_BqWIDFTjlZW_zsHzwaH5tSKzYLkZLoLG-w1D6yUWmd9MXDToI1__Ogpjc1AaimxGDAGdgkAKruNod7O2Emj3SsyXUQDgMqhtTKD-sKgf_vKEcUh_DpBuoYyGUQtw6-_L3nK1mB\/s1700-e365\/botim.jpg\" style=\"display: block;  text-align: center; clear: left; float: left;\"><img decoding=\"async\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhS7OCI8Zb-SSXu1DasAgAbi0gFWklPhGg3Mrm5Jzgb5lulolangOHpi_BqWIDFTjlZW_zsHzwaH5tSKzYLkZLoLG-w1D6yUWmd9MXDToI1__Ogpjc1AaimxGDAGdgkAKruNod7O2Emj3SsyXUQDgMqhtTKD-sKgf_vKEcUh_DpBuoYyGUQtw6-_L3nK1mB\/s1700-e365\/botim.jpg\" alt=\"\" border=\"0\" data-original-height=\"655\" data-original-width=\"1111\"\/><\/a><\/div>\n<p>Specifically, the\u00a0domain\u00a0\u00abencryption-plug-in-signal.com-ae[.]net\u00bb was used as an initial access vector for ProSpy by claiming to be a non-existent encryption\u00a0plugin for\u00a0Signal.The\u00a0spyware comes\u00a0fitted with capabilities to exfiltrate sensitive\u00a0data like contacts, SMS messages, device metadata, and local\u00a0files.<\/p>\n<p>Neither of the Egyptian journalists&#8217; accounts was ultimately infiltrated. However, SMEX revealed that the initial attack that targeted the Lebanese journalist on May 19, 2025, completely compromised their Apple Account and resulted in the addition of a virtual device to the account to gain persistent access to\u00a0the victim&#8217;s data. The\u00a0second wave of attacks was unsuccessful.<\/p>\n<p>While\u00a0there is no evidence that the three journalists were\u00a0targeted with spyware, the evidence shows that threat actors can use the methods and infrastructure associated with the attacks to deliver malicious payloads and exfiltrate sensitive\u00a0data.<\/p>\n<p>\u00abThis suggests that the operation we identified may be part of a broader regional surveillance effort aimed at monitoring communications and harvesting personal\u00a0data,\u00bb Access Now\u00a0said.<\/p>\n<p>Lookout, in its own analysis of these campaigns, attributed the disparate efforts to a hack-for-hire operation with ties\u00a0to Bitter, a threat\u00a0cluster that&#8217;s\u00a0assessed to\u00a0be tasked\u00a0with intelligence\u00a0gathering efforts in the interests of the Indian government. The\u00a0espionage campaign has been operational since at least\u00a02022.<\/p>\n<p>Based\u00a0on the phishing domains observed and ProSpy malware lures, the campaign has likely targeted victims in Bahrain, the U.A.E., Saudi Arabia, the U.K., Egypt, and potentially the U.S.,\u00a0or alumni of U.S. universities, indicating the attacks go beyond members of Egyptian and Lebanese civil\u00a0society.<\/p>\n<p>\u00abThe operation features a combination of targeted spear-phishing delivered through fake social media accounts and messaging applications leveraging persistent social engineering efforts, which may result in the delivery of Android spyware depending on\u00a0the target\u2019s\u00a0device,\u00bb the cybersecurity company\u00a0said.<\/p>\n<div class=\"dog_two clear\">\n<div class=\"cf\"><a href=\"https:\/\/thehackernews.uk\/fast-response-not-fast-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjgi9mu68zRUz1nCLLKmkAA2aBtNfP_JOTXulZoB6yImso1Onk7oM_LI0kdROu8fq5S5oDyMtd1j50W44Ye_8Sl3zQZiE8A9tmFr6kejGKjGh74uoxluF-RyBq_unDQlzjXZHCqQeuYXBoogda5zf0w-zXd6v0rIM7fEw6TcFf_QGWBu5Mop-djkEaOUa5A\/s728-e100\/tl-d.jpg\" width=\"729\" height=\"91\"\/><\/a><\/div>\n<\/div>\n<p>The\u00a0campaign&#8217;s links to Bitter stem\u00a0from <a href=\"https:\/\/pastebin.com\/WE7bjsat\">infrastructure connections<\/a>\u00a0between\u00a0\u00ab<a href=\"https:\/\/www.virustotal.com\/gui\/domain\/com-ae.net\/details\">com-ae[.]net<\/a>\u00bb and\u00a0\u00ab<a href=\"https:\/\/www.virustotal.com\/gui\/domain\/youtubepremiumapp.com\/details\">youtubepremiumapp[.]com<\/a>,\u00bb a domain flagged\u00a0by <a href=\"https:\/\/blog.cyble.com\/2022\/08\/09\/bitter-apt-group-using-dracarys-android-spyware\/\">Cyble<\/a>\u00a0and Meta in August 2022 as linked to Bitter in relation to an espionage effort that used fake sites mimicking trusted services like YouTube, Signal, Telegram, and WhatsApp to distribute an Android malware dubbed\u00a0Dracarys.<\/p>\n<p>Lookout&#8217;s analysis has also uncovered similarities between Dracarys and ProSpy, despite the\u00a0latter being\u00a0developed years later using\u00a0Kotlin instead\u00a0of\u00a0Java.\u00a0\u00abBoth families use worker logic to handle tasks, and they name the worker classes similarly. They\u00a0also both use numbered C2\u00a0commands,\u00bb the company\u00a0added.\u00a0\u00abWhile ProSpy exfiltrates data to server endpoints starting\u00a0with\u00a0&#8216;v3,&#8217; Dracarys exfiltrates data to server endpoints starting\u00a0with\u00a0&#8216;r3.'\u00bb<\/p>\n<p>These\u00a0connections notwithstanding, what makes the campaign unusual is that Bitter has\u00a0never been attributed to espionage campaigns targeting civil society\u00a0members. This\u00a0has raised two possibilities:\u00a0either it&#8217;s the work of a hack-for-hire operation with ties to Bitter or the threat actor itself is behind it, in which case it could indicate an expansion of its targeting\u00a0scope.<\/p>\n<p>\u00abWe do not know whether this represents an expansion\u00a0of Bitter&#8217;s role, or if it is an indication of overlap between Bitter and an unknown hack-for-hire\u00a0group,\u00bb Lookout\u00a0added.\u00a0\u00abWhat we do know is that mobile malware continues to be a primary means of spying on civil society, whether it is purchased through a commercial surveillance vendor, outsourced to a hack-for-hire organization, or deployed directly by a nation\u00a0state.\u00bb<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>An\u00a0apparent hack-for-hire campaign likely orchestrated by a threat actor with suspected ties to the Indian government targeted journalists, activists, and government officials across the Middle East and North Africa (MENA),&hellip;<\/p>\n","protected":false},"author":1,"featured_media":552,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[1143,6,1144,1145,161,1146,78],"class_list":["post-551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","tag-bitterlinked","tag-campaign","tag-hackforhire","tag-journalists","tag-mena","tag-region","tag-targets"],"_links":{"self":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=551"}],"version-history":[{"count":0,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/posts\/551\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=\/wp\/v2\/media\/552"}],"wp:attachment":[{"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thedigitalfortress.us\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}