{"id":5097,"date":"2026-04-09T11:36:42","date_gmt":"2026-04-09T11:36:42","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2026\/04\/09\/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group\/"},"modified":"2026-04-09T11:36:42","modified_gmt":"2026-04-09T11:36:42","slug":"middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group","status":"publish","type":"post","link":"http:\/\/ft365.org\/index.php\/2026\/04\/09\/middle-east-hack-for-hire-operation-traced-to-south-asian-cyber-espionage-group\/","title":{"rendered":"Middle East Hack-for-Hire Operation Traced to South Asian Cyber Espionage Group"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\">\n<div id=\"layout-4931fbad-a3b1-4361-a684-fe0b4e8eb804\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Several civil society figures in Middle Eastern countries, including three high-profile journalists in Egypt and Lebanon, have been targeted by a spear-phishing campaign likely tied to a known South Asian cyber espionage group.<\/p>\n<p>The campaign was detected by digital civil rights organization Access Now through its Digital Security Helpline in August 2025, following outreach from prominent Egyptian journalists Mostafa Al\u2011A\u2019sar and Ahmed Eltantawy.<\/p>\n<p>Access Now, a global non-profit organization, found that both individuals, prominent critics of the Egyptian government who have previously faced political imprisonment, had been targeted by spear-phishing campaigns carried out from 2023 to 2024.<\/p>\n<p>Upon investigating the campaigns, Access Now discovered Android malware tied to the phishing infrastructure.<\/p>\n<p>The NGO contacted researchers from mobile security firm Lookout, who assessed that the campaigns were \u201cmost likely\u201d a hack-for-hire operation with ties to the Bitter advanced persistent threat (APT) group.<\/p>\n<p>Bitter, also known as T-APT-17 and APT-C-08, is a suspected South Asian cyber espionage threat group that has been active since at least 2013. According to MITRE ATT&#038;CK, the group has targeted government, energy and engineering organizations in Pakistan, China, Bangladesh and Saudi Arabia.<\/p>\n<p>Researchers from ESET shared a report in October 2025 about two Android spyware strains posing as messaging apps and targeted users in the United Arab Emirates (UAE).<\/p>\n<p>Lookout determined that these implants \u2013 dubbed ProSpy and ToSpy by ESET but only tracked as ProSpy by Lookout \u2013 were used in the targeting of civil society in the campaign identified by Access Now.<\/p>\n<p>In parallel, SMEX, a Beirut-based non-profit organization advocating for digital rights across West Asia and North Africa, identified an unnamed high profile Lebanese journalist targeted by the same spear-phishing campaign in 2025.<\/p>\n<h2><strong>New Spear-Phishing Campaign in the Middle East<\/strong><\/h2>\n<p>According to an Access Now report published on April 8, attackers launched a spear-phishing campaign seeking to compromise Al-A\u2019sar and Eltantawy\u2019s Apple and Google accounts in October 2023 and continued in January 2024.<\/p>\n<p>The NGO said the attackers \u201cinvested time and effort to establish a connection with the targets through various channels.\u201d<\/p>\n<p>To do this, they impersonated legitimate people and services using fake accounts and profiles, messages and pages to impersonate people and mimic common services and platforms to deliver the ProSpy\/ToSpy malware.<\/p>\n<p>The messaging app Signal was among the targeted platforms for the spear-phishing campaign.<\/p>\n<\/p><\/div>\n<figure id=\"layout-ee36fe64-69e4-4637-af57-32c4dcd620d9\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"1\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/localimages\/cf8341ee-c4ca-48cd-a9e6-d8e31b0574b4.png\" alt=\"Example of a Signal Link Device QR Code phish used in this campaign, complete with instructions in Arabic. We have edited the image to disable the QR code. Source: Lookout\"><figcaption>Example of a Signal Link Device QR Code phish used in this campaign, complete with instructions in Arabic. We have edited the image to disable the QR code. Source: Lookout<\/figcaption><\/figure>\n<div id=\"layout-df814430-1747-44c0-a569-772b146ee625\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"2\">\n<p>In March 2026, Signal shared a public warning about such impersonation phishing campaigns.<\/p>\n<p>Thinking he was receiving a legitimate message from Apple, Al-A\u2019sar entered his account credentials, but refrained from engaging any further when he received a suspicious two-factor authentication (2FA) login notification from a distant location in Egypt.<\/p>\n<p>Eltantawy did not engage at all with the phishing lures and the attackers ultimately failed in compromising his or Al-A\u2019sar\u2019s accounts, Access Now noted.<\/p>\n<p>\u201cIf they had been successful, they would have gained unimpeded access to the personal and professional information in the targets\u2019 Apple and\/or Google accounts, including information on their families, associates and journalistic sources,\u201d the researchers said.<\/p>\n<p>This Android spyware could have allowed the attackers to access and extract victims\u2019 files, personal contacts, text messages and geolocation, enable device microphones and cameras as well as instal further malicious apps on the target\u2019s device.<\/p>\n<p>The attack targeting the Lebanese journalist, documented by SMEX in a separate report published on April 8, used similar tactics, but was successful in compromising the target\u2019s Apple account in 2025.\u00a0<\/p>\n<p>The campaign began in May 2025, with an initial attack delivered via Apple Messages. Two days later, a second wave followed through WhatsApp consisting of two separate phishing messages.<\/p>\n<p>Both waves used the same malicious infrastructure and aimed to compromise the victim\u2019s Apple Account.<\/p>\n<p>After detecting the attacks, the target contacted SMEX\u2019s Digital Forensics Lab (DFL) on May 25, prompting an immediate investigation due to the high risk and persistent threat.<\/p>\n<p>While the first attack succeeded in breaching the Apple Account and adding a virtual device, forensic evidence was limited because the case was only reported days after the incident. The second wave failed, but researchers captured a complete credential exfiltration, including the username, password and 2FA codes, revealing that the same infrastructure was used in all attacks.<\/p>\n<p>The analysis further showed that the attackers executed account takeovers in as little as 30 seconds from the moment the victim submitted their password.<\/p>\n<p>Lookout researchers said they believe the same campaign also likely targeted victims in Bahrain, including Bahraini government entities, the UAE, Saudi Arabia, the UK, Egyptian government entities, and potentially the US or alumni of US universities.<\/p>\n<h2><strong>Analysis of ProSpy Spyware<\/strong><\/h2>\n<p>Lookout researchers also shared details about the ProSpy Android malware used in the campaigns, of which they acquired 11 samples, the earliest found in August 2024.<\/p>\n<p>According to the researchers, while ProSpy is not as sophisticated as top-tier spyware like DarkSword, Coruna and Predator, it was developed \u201cin a relatively professional way\u201d using the Kotlin programming language. ProSpy integrates common spyware functions like collecting private information and exfiltrating sensitive files.<\/p>\n<p>The sample analysis showed that its maintainers have added new capabilities over the years, indicating the spyware is actively being developed.<\/p>\n<p>Lookout researchers also discovered live staging servers that are used to distribute ProSpy samples. These staging sites are simple, single page websites for specific messaging applications to lure victims to download the malicious APK files.\u00a0<\/p>\n<p>Typically, the threat group uses a two-stage attack to deliver ProSpy, first contacting targets via fake social media profiles or impersonating Apple Support, then tricking them into clicking spear-phishing links.<\/p>\n<p>Apple users are lured with fake iCloud or E2EE app phishing pages, while Android users are directed to download ProSpy malware, such as through a fake ToTok app update hosted on deceptive domains like totok-pro[.]ai-ae[.]io.<\/p>\n<p>The malicious site delivers an APK file in English and Arabic, disguising the attack with randomized URLs to evade detection.<\/p>\n<\/p><\/div>\n<figure id=\"layout-5ad806d7-cab1-45ce-9324-0ca13bf1c558\" data-layout-id=\"4\" data-edit-folder-name=\"image\" data-index=\"3\"><img decoding=\"async\" src=\"http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/localimages\/77b11505-eaa8-4956-bcf2-3da50923d458.png\" alt=\"ProSpy distribution site with ToTok application lure. Source: Lookout\"><figcaption>ProSpy distribution site with ToTok application lure. Source: Lookout<\/figcaption><\/figure>\n<div id=\"layout-154e512a-299f-4613-a886-ef4c4a2f1aa9\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"4\">\n<h2><strong>Attribution to Bitter APT: Technical Links and Shifting Targets<\/strong><\/h2>\n<p>Lookout researchers linked the ProSpy malware campaign to the Bitter APT group through multiple technical and operational overlaps.<\/p>\n<p>They found shared infrastructure, such as the domain <em>com-ae[.]net<\/em>, previously tied to Bitter\u2019s Dracarys malware, along with code similarities, including worker-class naming conventions, numbered command-and-control (C2) commands and the use of &#8220;pro\/premium&#8221; lures in app titles.<\/p>\n<p>While ProSpy and Dracarys were developed years apart, the structural and behavioral parallels, combined with Bitter\u2019s history of targeting Android devices and using PHP-based C2 infrastructure, strengthened the attribution.<\/p>\n<p>However, Lookout noted that Bitter\u2019s typical targets (military, energy and government entities) didn\u2019t align with the civil society and opposition figures compromised in the ProSpy campaign identified by Access Now and SMEX.<\/p>\n<p>This discrepancy, along with past overlaps between Bitter and Indian hack-for-hire groups led researchers to conclude that the operation may represent either an expansion of Bitter\u2019s scope or a collaboration with a hack-for-hire outfit tied to South Asia.<\/p>\n<p>While no direct links to known mercenary groups were found, evidence suggested Bitter, or a closely affiliated entity, was likely hired to conduct espionage in the Middle East and North Africa region, marking the first documented case of the group targeting civil society.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Several civil society figures in Middle Eastern countries, including three high-profile journalists in Egypt and Lebanon, have been targeted by a spear-phishing campaign likely tied to a known South Asian cyber espionage group. The campaign was detected by digital civil rights organization Access Now through its Digital Security Helpline in August 2025, following outreach from<\/p>\n","protected":false},"author":2,"featured_media":5098,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-5097","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"thumbnail":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d-150x150.jpg",150,150,true],"medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"medium_large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"1536x1536":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"2048x2048":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"morenews-featured":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"morenews-large":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"morenews-medium":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d.jpg",300,300,false],"crawlomatic_preview_image":["http:\/\/ft365.org\/wp-content\/uploads\/2026\/04\/5097-8ad15a5e-9cbf-49b9-9f13-61ff00a3101d-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"http:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"http:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5097","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=5097"}],"version-history":[{"count":0,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/5097\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/5098"}],"wp:attachment":[{"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=5097"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=5097"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=5097"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}