Close Menu
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
What's Hot

NHL Playoff Standings: Saturday’s High-Stakes Showdown & Essential Game Guide

17/04/2026

Unleashing Lightning: Pentagon’s 2027 Budget Targets 38 F-35s for Air Force

17/04/2026

Haaland’s Thunderous Treble Forges FA Cup History

17/04/2026
Facebook X (Twitter) Instagram
Friday, April 17
Facebook X (Twitter) Instagram
Newstech24.com
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
Newstech24.com
Home - Technology - Shadowy Hack-for-Hire Syndicate Busted: Android & iCloud Data at Risk
Technology

Shadowy Hack-for-Hire Syndicate Busted: Android & iCloud Data at Risk

By Admin12/04/2026No Comments8 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Hack-for-hire group caught targeting Android devices and iCloud backups
Share
Facebook Twitter LinkedIn Pinterest Email

Security researchers say they have identified a hack-for-hire group targeting journalists, activists, and government officials across the Middle East and North Africa. The hackers used phishing attacks to access targets’ iCloud backups and messaging accounts on Signal, and deployed Android spyware capable of taking over the targets’ devices.

Key Takeaways

  • A sophisticated hack-for-hire operation, codenamed BITTER (potentially RebSec Solutions), is actively targeting journalists, activists, and government officials across the Middle East, North Africa, and extending globally.
  • This campaign underscores a growing, global trend where governments outsource cyber espionage to private entities, leveraging these groups for plausible deniability and cost-effective, yet potent, hacking capabilities.
  • Attack vectors include highly effective phishing for iCloud credentials, deployment of Android spyware (ProSpy) disguised as popular apps, and tricking victims into registering hacker-controlled devices on Signal.

Shadowy Hack-for-Hire Group Targets Journalists and Officials Globally, Researchers Warn

A new and concerning chapter in the world of private cyber espionage is unfolding, as leading security researchers reveal details of a persistent hack-for-hire group actively targeting a diverse array of high-value individuals. This shadowy entity, identified by the mobile cybersecurity firm Lookout as operating under the codename BITTER, is suspected of having significant ties to the Indian government and is allegedly an offshoot of the previously exposed hack-for-hire startup, Appin.

The group’s pervasive operations span across the Middle East and North Africa, with verified victims including prominent journalists, human rights activists, and government officials. Alarmingly, the scope of these attacks extends even further, reaching targets in the United Arab Emirates, Saudi Arabia, the United Kingdom, and potentially even individuals residing in the United States or alumni of American universities. This broad and escalating reach highlights the increasing globalization of outsourced cyber attacks and the complex web of digital threats faced by civil society, independent media, and government agencies alike.

The Rise of Outsourced Cyber Espionage

This hacking campaign is not an isolated incident but rather a stark illustration of a disturbing global trend: the quiet but rapid proliferation and outsourcing of state-sponsored hacking operations to private, commercial entities. Governments are increasingly turning to specialized hack-for-hire companies, not only for the development of sophisticated spyware and exploits but also for the end-to-end execution of entire espionage campaigns. This strategy offers significant advantages to state actors, primarily providing a crucial layer of plausible deniability, allowing them to distance themselves from potentially controversial, politically sensitive, or outright illegal cyber activities.

Moreover, as Justin Albrecht, principal researcher at Lookout, articulated in an interview with TechCrunch, these hack-for-hire groups often represent a far more cost-effective alternative to acquiring high-end, bespoke commercial spyware solutions. “These groups and their customers get plausible deniability since they run all the operations and infrastructure,” Albrecht explained, adding that for their clients, such comprehensive services are “likely cheaper than purchasing commercial spyware,” presenting an irresistible proposition for those seeking to expand their surveillance capabilities discreetly.

Techcrunch event

San Francisco, CA
|
October 13-15, 2026

Unmasking BITTER: A Legacy of Cyber Mercenaries

Lookout’s in-depth investigation led them to codename the group BITTER, with strong suspicions that it is intimately linked to RebSec Solutions. Albrecht further elaborated that RebSec Solutions could be a direct successor or a significant offshoot of Appin, a notorious Indian hack-for-hire startup that gained international infamy through extensive investigative reports published by Reuters in 2022 and 2023. These meticulously detailed reports exposed how Appin and other similar India-based firms were allegedly hired to compromise the digital security of a wide range of targets, including corporate executives, high-ranking politicians, and military officials.

Although Appin reportedly ceased operations following these damning exposes, Albrecht warns that the underlying illicit activity did not simply vanish. “The discovery of this new hacking campaign shows that the activity didn’t disappear and they just moved onto smaller companies,” he noted, suggesting a resilient, adaptive, and decentralized ecosystem of cyber mercenaries. Efforts by researchers to contact RebSec Solutions proved futile, as the company has apparently scrubbed its entire online presence, deleting social media accounts and its official website – a common tactic employed by groups seeking to evade scrutiny and attribution.

The Victims: Journalists, Activists, and State Officials Across Continents

The collaborative efforts of prominent digital rights organizations Access Now and SMEX, working in conjunction with Lookout, have meticulously documented several specific instances of these sophisticated attacks. Access Now, leveraging its specialized Digital Security Helpline, verified three distinct attacks that occurred between 2023 and 2025, targeting two Egyptian journalists and one Lebanese journalist. The Lebanese case, notably, was also independently documented by SMEX, underscoring the severity and authenticity of these threats and the coordinated nature of the research efforts.

However, Lookout’s comprehensive findings indicate a far broader and more alarming scope than initially understood. Beyond civil society members in Egypt and Lebanon, the campaign extended to include high-profile targets within the Bahraini and Egyptian governments, as well as individuals in the United Arab Emirates, Saudi Arabia, and the United Kingdom. The potential targeting of individuals in the United States or alumni of American universities signals an even wider international reach and a deeply worrying expansion of this private espionage network, suggesting that virtually no geography or sector is immune.

Mohammed Al-Maskati, an investigator with Access Now’s Digital Security Helpline who worked directly on these cases, highlighted the insidious nature of these operations. “These operations have become cheaper and it’s possible to evade responsibility, especially since we won’t know who the end customer is, and the infrastructure won’t reveal the entity behind it.” This deliberate opacity makes robust attribution incredibly difficult and accountability almost impossible, creating a fertile ground for unchecked digital aggression and a significant challenge for international law enforcement and human rights advocates.

Contact Us

Do you have more information about RedSec Solutions? Or other hack-for-hire companies? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.

BITTER’s Arsenal: Exploiting Vulnerabilities Across Diverse Platforms

While groups like BITTER may not always possess the bleeding-edge, zero-day exploits typically associated with elite nation-state actors or premium commercial spyware vendors, their tactics are demonstrably highly effective, leveraging a potent combination of social engineering and well-known vulnerabilities. The multi-platform approach used in this campaign demonstrates a pragmatic, adaptive, and dangerously effective methodology.

Targeting iOS Users: iCloud Phishing Exploits

For iPhone users, the hackers employed a meticulously crafted and deceptive phishing strategy. They developed convincing lures, often masquerading as legitimate service notifications or urgent alerts, designed to trick targets into divulging their sensitive Apple ID credentials. The ultimate goal? To gain unauthorized access to their iCloud backups. This method, as Access Now judiciously points out, is “potentially a cheaper alternative to the use of more sophisticated and expensive iOS spyware.” By compromising iCloud backups, the attackers could effectively gain comprehensive access to a vast trove of personal data, including private messages, intimate photos, contacts, call logs, and other highly sensitive information stored on the victims’ iPhones, all without needing to deploy complex on-device spyware that might be detected.

Targeting Android Users: ProSpy Spyware Deployment

Android users, a significant demographic, faced a different but equally potent threat. The hackers deployed a powerful and intrusive spyware known as ProSpy. To ensure successful installation, ProSpy was cleverly disguised as legitimate and widely used messaging and communications applications. These included global giants like Signal, WhatsApp, and Zoom, as well as apps particularly popular in the Middle East, such as ToTok and Botim. Once successfully installed and granted permissions, ProSpy is capable of a comprehensive takeover of the target’s device, granting attackers extensive control and access to nearly all device data and functions, turning the victim’s smartphone into a powerful surveillance tool.

Insidious Signal Account Hijacking

In a particularly insidious maneuver, the hackers also attempted to exploit the trust users place in secure messaging platforms like Signal. They tried to trick victims into registering a new, hacker-controlled device to their existing Signal account. This technique, also reportedly used by other sophisticated groups including Russian intelligence, allows attackers to receive and send messages from the victim’s Signal account, effectively bypassing end-to-end encryption by becoming another legitimate endpoint on the user’s account. This method poses a severe and direct threat to individuals relying on Signal for secure and confidential communications, undermining a core pillar of digital security for journalists and activists.

A spokesperson for the Indian embassy in Washington D.C. did not immediately respond to a request for comment regarding the suspected ties of BITTER/RebSec Solutions to the Indian government, leaving crucial questions of state involvement unanswered.

The Bottom Line

The revelations surrounding the BITTER hack-for-hire group serve as a stark and urgent reminder of the escalating and relentlessly evolving threats in the global digital landscape. As private cyber mercenary groups proliferate, become more decentralized, and grow increasingly adept at leveraging cost-effective, yet highly impactful, tactics, the lines between clandestine state-sponsored espionage and commercial hacking blur almost entirely. For journalists, human rights activists, government officials, and indeed, any individual handling sensitive information, the risk of digital compromise is ever-present and demands continuous vigilance, robust security practices, and sustained, collaborative efforts from digital rights organizations, cybersecurity firms, and policymakers to expose and counter these pervasive threats. The ongoing fight for digital privacy, press freedom, and human rights is far from over, and the resilience and adaptability of these hack-for-hire operations ensure it will remain a critical battleground for years to come.


{content}

Source: {feed_title}

Like this:

Like Loading...

Related

Android backups caught Devices group Hackforhire iCloud Targeting
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Admin
  • Website

Related Posts

Japan’s Robots: They Don’t Want Your Job, They Want the One You Hate

16/04/2026

Beyond Text: DeepL’s AI Unleashes Real-Time Voice Translation

16/04/2026

Don’t Miss Out: Your Shot at Startup Battlefield 200 Glory Ends May 27!

15/04/2026
Leave A Reply Cancel Reply

Don't Miss
Sports

NHL Playoff Standings: Saturday’s High-Stakes Showdown & Essential Game Guide

By Admin17/04/20260

Hold onto your hats, hockey fanatics! The NHL season is hurtling towards its electrifying conclusion,…

Like this:

Like Loading...

Unleashing Lightning: Pentagon’s 2027 Budget Targets 38 F-35s for Air Force

17/04/2026

Haaland’s Thunderous Treble Forges FA Cup History

17/04/2026

Mallorca vs. Real Madrid: La Liga’s Island Showdown

17/04/2026

Royal Navy Masters NATO’s Submarine Lifeline

17/04/2026

FA Cup Quarter-Final Clash: Chelsea vs. Port Vale – Every Goal, Key Stat & Decisive Moment

17/04/2026

Atletico Madrid vs. Barcelona: La Liga’s Explosive Showdown – Live Scores, Goals & Analysis

17/04/2026

After Port Vale Rout, Rosenior Issues Chelsea a Bold FA Cup Challenge for the Season

17/04/2026

Sabres Break the Curse; Jets Inherit NHL’s Longest Playoff Drought

17/04/2026

Decades-Long Wait Ends: Sabres Erase NHL’s Longest Playoff Drought

17/04/2026
Advertisement
About Us
About Us

NewsTech24 is your premier digital news destination, delivering breaking updates, in-depth analysis, and real-time coverage across sports, technology, global economics, and the Arab world. We pride ourselves on accuracy, speed, and unbiased reporting, keeping you informed 24/7. Whether it’s the latest tech innovations, market trends, sports highlights, or key developments in the Middle East—NewsTech24 bridges the gap between news and insight.

Company
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Disclaimer
  • Terms Of Use
Latest Posts

NHL Playoff Standings: Saturday’s High-Stakes Showdown & Essential Game Guide

17/04/2026

Unleashing Lightning: Pentagon’s 2027 Budget Targets 38 F-35s for Air Force

17/04/2026

Haaland’s Thunderous Treble Forges FA Cup History

17/04/2026

Mallorca vs. Real Madrid: La Liga’s Island Showdown

17/04/2026

Royal Navy Masters NATO’s Submarine Lifeline

17/04/2026
Newstech24.com
Facebook X (Twitter) Tumblr Threads RSS
  • Home
  • News
  • Technology
  • Economy & Business
  • Sports News
© 2026

Type above and press Enter to search. Press Esc to cancel.

Powered by
►
Necessary cookies enable essential site features like secure log-ins and consent preference adjustments. They do not store personal data.
None
►
Functional cookies support features like content sharing on social media, collecting feedback, and enabling third-party tools.
None
►
Analytical cookies track visitor interactions, providing insights on metrics like visitor count, bounce rate, and traffic sources.
None
►
Advertisement cookies deliver personalized ads based on your previous visits and analyze the effectiveness of ad campaigns.
None
►
Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.
None
Powered by
%d