Hack-for-hire spyware campaign targets journalists in Middle East, North Africa

April 8, 20265 min read3 sources
Share:
Hack-for-hire spyware campaign targets journalists in Middle East, North Africa

A collaborative investigation uncovers a sophisticated surveillance operation

A new report from a coalition of digital rights and cybersecurity organizations has exposed a sophisticated hack-for-hire spyware campaign targeting journalists and civil society members across the Middle East and North Africa (MENA). The investigation, a joint effort by Access Now, Lookout Threat Lab, and SMEX, attributes the operation with high confidence to Bitter, an advanced persistent threat (APT) group suspected of having connections to the Indian government. The campaign leverages a custom Windows spyware, dubbed ProSpy, to conduct extensive surveillance on its victims, posing a severe threat to press freedom and personal safety in the region.

Background: The Bitter APT and the hack-for-hire ecosystem

Bitter is not a new player on the cyber-espionage stage. The group has been active for over a decade, historically focusing on targets in Pakistan and China. Security researchers have long tracked its activities, noting its development of custom malware and its alignment with Indian geopolitical interests. This latest campaign represents a strategic expansion of its targeting, moving into the MENA region with a focus on a particularly vulnerable group: journalists.

The operation fits within a disturbing global pattern of mercenary surveillance. While distinct from commercial spyware vendors like NSO Group, hack-for-hire groups like Bitter operate with a similar objective: providing targeted surveillance capabilities to clients. These groups often maintain a degree of plausible deniability for their state sponsors while executing strategic intelligence-gathering operations.

Technical analysis: How ProSpy infiltrates and operates

The attack chain detailed in the joint report is a classic example of highly targeted social engineering combined with custom-built malware. The success of the campaign hinges on its ability to craft convincing lures tailored to the professional lives of its targets.

The initial compromise: Personalized phishing

Attackers initiated contact through meticulously crafted phishing emails. Unlike mass-market spam, these messages were personalized, often impersonating reputable organizations, human rights groups, or potential sources. The lures were designed to be irresistible to journalists, including fake job opportunities, requests for interviews on sensitive political topics, or links to seemingly urgent reports on human rights violations. These emails contained malicious attachments, typically disguised as Word documents or PDFs, which served as the dropper for the primary payload.

The payload: ProSpy spyware

Once a victim opens the malicious document, the ProSpy spyware is covertly installed on their Windows system. Lookout's analysis reveals it to be a feature-rich surveillance tool designed for comprehensive data exfiltration. Its capabilities include:

  • Keystroke logging: Capturing everything the victim types, including passwords, private messages, and draft articles.
  • Data theft: Exfiltrating files, documents, images, and browser data such as cookies and saved credentials.
  • Live surveillance: Activating the device’s microphone and webcam to record audio and video without the user's knowledge.
  • Environment capture: Taking screenshots of the victim's screen and monitoring clipboard activity.
  • Remote control: Executing arbitrary commands on the compromised machine, allowing attackers to deepen their foothold.

ProSpy also employs persistence techniques, such as creating scheduled tasks or modifying the system registry, to ensure it survives a system reboot. The stolen data is sent to command-and-control (C2) servers managed by the attackers. Researchers linked the malware's code and the C2 infrastructure to historical operations conducted by the Bitter APT, solidifying the attribution.

Impact assessment: A direct assault on press freedom

The impact of this campaign extends far beyond technical compromise. Targeting journalists is a direct assault on the free press, a cornerstone of democratic societies.

Who is affected? The primary targets are journalists and media professionals in the MENA region, with confirmed cases in Yemen and Syria. The scope likely includes human rights defenders and other civil society actors whose work involves holding power to account. The very nature of their work—communicating with sensitive sources, investigating corruption, and reporting from conflict zones—makes them high-value targets for intelligence agencies.

How severe is the threat? The consequences are severe. A compromised journalist's device becomes a listening post for adversaries, exposing confidential sources to retaliation, imprisonment, or physical harm. The theft of unpublished research can sabotage investigations and give state actors an advantage in controlling narratives. This creates a powerful chilling effect, where journalists may self-censor or abandon sensitive stories for fear of surveillance, ultimately depriving the public of vital information.

How to protect yourself

For journalists and other high-risk individuals, defending against sophisticated threats like ProSpy requires a multi-layered security posture. While no single solution is foolproof, adopting the following practices can significantly reduce the risk of compromise.

  1. Assume you are a target: The most important step is a mental one. Understand that your work makes you a target for surveillance. This mindset encourages consistent security vigilance.
  2. Scrutinize all communications: Treat unsolicited emails with extreme caution, especially those containing attachments or urgent requests. Verify the sender's identity through a separate, trusted channel before opening any documents or clicking links.
  3. Strengthen endpoint security: Keep your operating system and all software, especially browsers and office suites, fully updated to patch known vulnerabilities. Use a reputable antivirus or endpoint detection and response (EDR) solution.
  4. Compartmentalize your digital life: Use separate devices for work and personal activities where possible. Use different browsers with unique profiles for different tasks to limit the blast radius of a browser-based compromise.
  5. Encrypt your communications and traffic: Use end-to-end encrypted messaging apps like Signal for sensitive conversations. When accessing the internet, especially on untrusted networks, using a reputable hide.me VPN can help protect your connection from local eavesdropping and mask your IP address.
  6. Seek expert help: If you suspect a compromise, disconnect the device from the internet immediately and contact a digital security helpline. Organizations like Access Now provide free, expert incident response support for civil society.

This campaign is a stark illustration of the evolving threats facing journalists worldwide. The collaboration between Access Now, Lookout, and SMEX was essential in uncovering this operation and providing a warning to at-risk communities. It underscores the critical need for continued vigilance, shared intelligence, and direct support to protect those who work on the front lines of truth.

Share:

// FAQ

Who is the Bitter APT group?

Bitter is an advanced persistent threat (APT) group, also known as a sophisticated hacking group, that has been active for over a decade. Security researchers believe the group has ties to the Indian government and has historically targeted entities in Pakistan and China. This new campaign shows an expansion of their operations into the Middle East and North Africa.

What is ProSpy spyware and what can it do?

ProSpy is a custom-built spyware for Windows discovered by Lookout Threat Lab. It is designed for total surveillance of a victim's device. Its capabilities include logging keystrokes, stealing files, capturing screenshots, recording audio via the microphone, accessing the webcam, and stealing browser data like passwords and cookies.

Why are journalists in the Middle East and North Africa being targeted?

Journalists in the MENA region are often targeted because they report on sensitive political issues, conflicts, and human rights abuses. By compromising their devices, attackers can identify their confidential sources, monitor their investigations, steal unpublished information, and ultimately suppress reporting that is critical of certain governments or powerful entities.

How was this spyware campaign discovered?

The campaign was uncovered through a collaborative effort. It began when targeted individuals in the MENA region contacted Access Now's Digital Security Helpline for assistance. Access Now then worked with security firm Lookout and regional digital rights group SMEX to perform a deep technical analysis, which identified the ProSpy malware and attributed the campaign to the Bitter APT group.

// SOURCES

// RELATED

OpenAI caught in the crossfire of a North Korea-linked supply chain attack

OpenAI revoked a macOS code signing certificate after it was potentially compromised as part of a sophisticated, North Korea-linked supply chain attac

6 min readApr 14

Invisible threats: Analyzing state-sponsored fiber tapping, Windows rootkits, and the AI arms race

An analysis of this week's top threats, including state-sponsored infrastructure attacks, persistent UEFI rootkits, and a critical PDF zero-day.

6 min readApr 14

Russian state-linked APT28 exploits SOHO routers in global DNS hijacking campaign

Russian state-linked hackers APT28 are exploiting insecure home and office routers globally in a widespread DNS hijacking campaign for cyber espionage

7 min readApr 13

Russia's Forest Blizzard nabs rafts of logins via SOHO routers

Russia's APT28 spies on global organizations by modifying DNS settings in vulnerable SOHO routers, enabling widespread, 'malwareless' credential theft

6 min readApr 13