Hack-for-hire group targets journalists, activists in Middle East and North Africa

Summary: Cybersecurity: an investigation indicates that a hack-for-hire group has been targeting journalists, activists, and government officials in the Middle East and North Africa.

Campaign Analysis: 'Hack-for-Hire' Groups Compromise Android Ecosystems and iCloud Backups

A recent investigative report by TechCrunch has illuminated the growing sophistication of "demand-side" hacking services. Unlike traditional ransomware groups driven by immediate financial extortion, these Hack-for-Hire entities specialize in selective data exfiltration via mobile devices and cloud storage, operating under an "Espionage-as-a-Service" model.

1. Adversary Profile: The 'Access-on-Demand' Model

Hack-for-Hire groups represent a professionalized evolution in the cybercrime supply chain. They operate under specific contracts, tailoring their TTPs (Tactics, Techniques, and Procedures) to the target:

  • Active Reconnaissance: Exhaustive OSINT (Open Source Intelligence) mapping of the victim’s digital footprint.

  • Silent Persistence: The objective is long-term surveillance rather than immediate disruption.

  • Agile Infrastructure: Utilization of high-reputation C2 (Command & Control) servers with rapid domain fluxing to evade Intrusion Detection Systems (IDS).

2. Attack Vectors and Surface Expansion

A. Android Compromise: Weaponizing the Trust Chain

The assault on Android devices transcends generic malware, focusing on Side-loading and the abuse of critical system APIs:

  • Precision Social Engineering: Distribution of Trojanized applications through spear-phishing on encrypted platforms like WhatsApp or Telegram.

  • Accessibility Services Abuse: Once installed, the malicious code exploits Accessibility APIs to perform screen scraping, keylogging, and the extraction of local databases from encrypted messaging apps before the data is encrypted for transport.

B. iCloud Vulnerability: Backups as the Path of Least Resistance

The most critical vector is the compromise of iCloud backups, enabling "cold exfiltration" without direct interaction with the physical device:

  • Account Takeover (ATO): Use of high-fidelity phishing to harvest Apple IDs, often employing AiTM (Adversary-in-the-Middle) proxies to bypass standard MFA.

  • MFA Exhaustion: Utilizing "Push Fatigue" attacks or token interception to bypass multi-factor layers.

  • Cloud Forensics: Once the full backup is downloaded, the attacker gains access to iMessage history, Keychain (passwords), and location metadata without triggering real-time alerts on the user's handset.

3. Evasion and Anti-Forensic Techniques

To ensure operational longevity, these groups employ advanced stealth mechanisms:

  • Fileless Execution: Running malicious scripts directly in memory to avoid leaving artifacts on the physical disk.

  • Traffic Camouflage: Exfiltration is masked using legitimate HTTPS protocols and CDNs, making data spikes indistinguishable from routine cloud synchronization.

  • Log Purging: Post-exfiltration, the malware is programmed to wipe system audit logs and delete the initial installation vectors.

  • Environment Awareness: The software employs Anti-Sandboxing to detect virtualized or forensic environments, self-terminating if it detects researcher monitoring.

4. Privacy Impact Matrix

Compromised AssetIntelligence ValueLocal SQL DatabasesAccess to "at-rest" messages from apps like Signal, WhatsApp, or Telegram.Session TokensAbility to hijack active corporate sessions (Slack, CRM, Email).EXIF MetadataHistorical tracking of exact geographical movements and habits.

5. Strategic Mitigation Recommendations

Given the surgical nature of these attacks, defense must be granular and identity-centric:

  1. Advanced Data Protection (iCloud): Enable end-to-end encryption for cloud backups, ensuring that only trusted device keys—and not the service provider—can decrypt the data.

  2. Hardware Security Keys: Replace SMS or push-based 2FA with FIDO2 hardware keys (e.g., YubiKey) to eliminate the risk of remote token interception.

  3. Permission Auditing: Conduct regular manual audits of Android "Accessibility" and "Notification" permissions to identify unauthorized listeners.

  4. Lockdown Mode: Mandatory for high-risk profiles; this feature reduces the attack surface by blocking message attachments and limiting complex web technologies.

Conclusion: The New Perimeter is the Backup

The TechCrunch report confirms that in 2026, backups have become the new perimeter. The professionalization of Hack-for-Hire services has democratized state-level espionage tools. For the modern enterprise, the security burden has shifted: it is no longer just about hardening the hardware, but about ensuring digital identity integrity and the absolute encryption of data at rest.

The question is no longer if your device is secure, but if your cloud mirror is defended.

Key facts

  • Cybersecurity: discovered three attacks against Egyptian and Lebanese journalists in 2023-2025.
  • Hackers used phishing to access iCloud backups and Signal accounts.
  • The company Lookout identified a connection with the BITTER APT group.

Why it matters

This spying campaign highlights the growing trend of governments contracting private companies to perform hacking operations, which can be cheaper than purchasing commercial spyware.