
Hack-for-Hire Group Targets MENA Journalists and Officials
Why It Matters
The operation demonstrates how low‑cost, hack‑for‑hire services can weaponize consumer apps to surveil high‑profile targets, raising security risks for press freedom and diplomatic communications in a volatile region.
Key Takeaways
- •Hack‑for‑hire group exploited iCloud backups via phishing for Apple IDs.
- •Android victims received ProSpy disguised as Signal or WhatsApp.
- •Campaign spanned 2023‑2025, targeting MENA journalists, activists, officials.
- •Group linked to BITTER APT and possible offshoot of India's Appin.
Pulse Analysis
The emergence of hack‑for‑hire outfits marks a shift from state‑run cyber‑espionage to a marketplace where sophisticated tools are sold to the highest bidder. In the MENA region, where press freedoms are already under pressure, the group’s use of phishing to harvest Apple ID credentials allowed them to infiltrate iCloud backups, exposing emails, photos and documents without the victim’s knowledge. By leveraging familiar messaging platforms, the attackers lowered the barrier for successful infection, making the threat both pervasive and hard to detect.
Technical analysis reveals that the Android payload, dubbed ProSpy, mimics legitimate apps like Signal and WhatsApp, granting attackers remote command‑and‑control, keystroke logging, and real‑time audio capture. Compared with commercial spyware suites, this approach is cheaper and offers plausible deniability for clients, who can claim the devices were compromised by ordinary malware. The link to BITTER APT—a known threat actor—and the suspected involvement of Appin’s offshoot suggest a hybrid model where state‑level expertise is repackaged for private contracts, blurring the lines between geopolitical espionage and criminal profiteering.
For media organizations and NGOs operating in the region, the campaign underscores the urgency of adopting robust cyber hygiene. Multi‑factor authentication, regular credential audits, and device encryption become essential defenses against credential‑stealing phishing. Moreover, the cross‑border nature of the attacks—reaching into Saudi Arabia, the UK and the US—highlights a broader trend of regional conflicts spilling into the digital sphere, prompting governments and enterprises to reassess threat models and invest in threat‑intelligence sharing. The incident serves as a cautionary tale that even low‑cost, off‑the‑shelf tools can deliver high‑impact surveillance when wielded by skilled actors.
Hack-for-hire group targets MENA journalists and officials
Comments
Want to join the conversation?
Loading comments...