Crime NewsFeatured

Global phishing war targets smartphones in massive hack-for-hire espionage campaign

Simple tricks, severe impact; cyberattack wave hits governments, journalists, and activists worldwide; 1,500 fake login domains expose how phishing still powers modern cyber warfare

A new cybersecurity investigation has revealed an ongoing hacking campaign targeting smartphones running both iOS and Android systems, highlighting how attackers continue to rely on relatively simple but highly effective phishing techniques.

The operation has primarily targeted journalists, activists, and government officials across the Middle East and North Africa, with additional victims identified in Europe and North America, according to cybersecurity researchers.

Coordinated Hack-for-Hire Operation Identified

Findings reported by TechCrunch and based on analyses from three cybersecurity organizations—Access Now, Lookout, and SMEX—indicate that the activity is linked to a long-running espionage operation associated with a group known as BITTER APT.

Researchers believe the group is connected to a commercial “hack-for-hire” ecosystem, where surveillance services are offered to paying clients seeking access to sensitive information, according to TechTimes.

Rather than deploying advanced zero-day vulnerabilities, the campaign relies heavily on phishing and deception tactics, underscoring the continued effectiveness of social engineering in modern cyberattacks.

Apple ID Phishing at the Core of the Attacks

Investigators found that one of the primary methods involved directing Apple users to fake login pages designed to steal Apple ID credentials. Once obtained, attackers could access iCloud backups and other sensitive data linked to compromised accounts.

According to reports cited by 9to5Mac, researchers identified nearly 1,500 malicious domains impersonating services such as iCloud, FaceTime, and Apple sign-in portals. These fraudulent websites were carefully designed to resemble legitimate pages, making detection difficult for users.

Cross-Platform Targeting Across Major Tech Services

While Apple users were heavily targeted, the campaign also extended to users of Google, Microsoft, Signal, WhatsApp, and Yahoo platforms.

The attackers used similar phishing methods to harvest login credentials across multiple services.
Experts note that this cross-platform approach demonstrates the flexibility of phishing operations, which depend more on human error than technical system flaws.

Recent warnings from Google have also highlighted similar threats, including advanced iOS-focused exploits reported in recent months.

Simple Methods, High Impact

Despite the availability of advanced spyware tools, the investigation concludes that phishing remains one of the most effective attack techniques used by cybercriminal groups.

Security experts stress that stronger user awareness and wider adoption of multi-factor authentication remain critical defenses against increasingly sophisticated and widespread cyber threats.




Follow The Times Kuwait on X, Instagram, Facebook and Whatsapp Channel for the latest news updates


 






Read Today's News TODAY...
on our Telegram Channel
click here to join and receive all the latest updates t.me/thetimeskuwait



Back to top button