Hack-for-hire group caught targeting Android devices and iCloud backups
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,抓住主要信息。 文章讲的是安全研究人员发现了一个针对中东和北非的记者、活动人士和政府官员的黑客组织。他们使用钓鱼攻击获取iCloud备份和Signal账户,还部署了安卓间谍软件控制设备。这些黑客可能与BITTER APT有关,该组织被怀疑与印度政府有联系。此外,文章提到这些外包的黑客服务让政府更容易隐藏身份,并且成本较低。 接下来,我需要将这些要点浓缩到100字以内。要确保涵盖主要目标、攻击手段、幕后组织以及外包带来的影响。 可能的结构是:首先说明黑客组织及其目标,然后描述攻击方法,接着提到背后可能的关联和外包的趋势,最后点出成本和匿名性。 现在试着组织语言: 安全研究人员发现一个针对中东和北非记者、活动人士及政府官员的黑客组织。该组织利用钓鱼攻击获取iCloud备份和Signal账户,并使用安卓间谍软件控制设备。他们可能与BITTER APT有关,该组织被怀疑与印度政府有联系。这种外包趋势使政府能隐藏身份并降低成本。 检查字数是否在100字以内,并确保信息准确无误。 </think> 安全研究人员发现一个针对中东和北非记者、活动人士及政府官员的黑客组织。该组织利用钓鱼攻击获取iCloud备份和Signal账户,并使用安卓间谍软件控制设备。他们可能与BITTER APT有关,该组织被怀疑与印度政府有联系。这种外包趋势使政府能隐藏身份并降低成本。 2026-4-8 19:18:51 Author: techcrunch.com(查看原文) 阅读量:7 收藏

Security researchers say they have identified a hack-for-hire group targeting journalists, activists, and government officials across the Middle East and North Africa. The hackers used phishing attacks to access targets’ iCloud backups and messaging accounts on Signal, and deployed Android spyware capable of taking over the targets’ devices.

This hacking campaign highlights a growing trend of government agencies outsourcing their hacking operations to private hack-for-hire companies. Some governments already rely on commercial companies that develop spyware and exploits used by police and intelligence agencies to access data on people’s phones.

Researchers from the digital rights organization Access Now documented three instances of attacks over 2023 through 2025 against two Egyptian journalists, and a journalist in Lebanon whose case was also documented by digital rights organization SMEX. 

Mobile cybersecurity company Lookout also investigated these attacks. The three organizations collaborated with each other and published separate reports on Wednesday. 

According to Lookout, the attacks go beyond members of Egyptian and Lebanese civil society, and include targets in the Bahraini and Egyptian governments, as well as targets in the United Arab Emirates, Saudi Arabia, the United Kingdom, and potentially the United States or alumni of American universities. 

Lookout concluded that the hackers behind this espionage campaign work for a hack-for-hire vendor with connections to BITTER APT, a hacking group that cybersecurity companies suspect has ties to the Indian government.

Justin Albrecht, principal researcher at Lookout, told TechCrunch that the company behind the campaign may be an offshoot of the Indian hack-for-hire startup Appin, and noted one such company named RebSec as a possible suspect. In 2022 and 2023, Reuters published extensive investigations into Appin and other similar India-based companies, which exposed how these companies are allegedly hired to hack company executives, politicians, military officials, and others. 

Techcrunch event

San Francisco, CA | October 13-15, 2026

Appin apparently later shut down, but Albrecht noted that the discovery of this new hacking campaign shows that the activity “didn’t disappear and they just moved onto smaller companies.” 

These groups and their customers get “plausible deniability since they run all the operations and infrastructure.” And for their customers, these hack-for-hire groups are likely cheaper than purchasing commercial spyware, said Albrecht. 

Rebsec could not be reached for comment, as the company has deleted its social media accounts and website. 

Contact Us

Do you have more information about Rebsec Solutions? Or other hack-for-hire companies? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

⁨Mohammed Al-Maskati⁩, an investigator and director at Access Now’s Digital Security Helpline who worked on these cases, said that “these operations have become cheaper and it’s possible to evade responsibility, especially since we won’t know who the end customer is, and the infrastructure won’t reveal the entity behind it.”

While groups like BITTER may not have the most advanced hacking and spy tools, their tactics can still be highly effective. 

In the attacks part of this campaign, the hackers used several different techniques. When targeting iPhone users, the hackers tried to trick targets into giving up their Apple ID credentials in order to then hack into their iCloud backups, which effectively would have given them access to the full content of the targets’ iPhones. 

This is “potentially a cheaper alternative to the use of more sophisticated and expensive iOS spyware,” according to Access Now.

When targeting Android users, the hackers used a spyware called ProSpy, masquerading as popular messaging and communications apps like Signal, WhatsApp, and Zoom, as well as ToTok and Botim, two apps that are popular in the Middle East. 

In some cases, the hackers tried to trick victims into registering and adding a new device — controlled by the hackers — to their Signal account, a technique that has been popular among various hacking groups, including Russian spies.

A spokesperson for the Indian embassy in Washington, D.C. did not immediately respond to a request for comment.

Lorenzo Franceschi-Bicchierai is a Senior Writer at TechCrunch, where he covers hacking, cybersecurity, surveillance, and privacy.

You can contact or verify outreach from Lorenzo by emailing [email protected], via encrypted message at +1 917 257 1382 on Signal, and @lorenzofb on Keybase/Telegram.

View Bio


文章来源: https://techcrunch.com/2026/04/08/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups/
如有侵权请联系:admin#unsafe.sh