Facebook Catches Palestinian Hackers Targeting Users with Malware

Facebook caught two groups of hackers, one of which may be working for Hamas, targeting politicians and human rights activists in the region. Hackers were using Android, iOS, and Windows malware.

Apr 21 2021, 6:00pm
Hacking. Disinformation. Surveillance. CYBER is Motherboard's podcast and reporting on the dark underbelly of the internet.

Two separate groups of hackers from Palestine have been targeting Facebook users with Android, iOS, and Windows malware, according to a report published by Facebook on Wednesday. 

Facebook security researchers identified two separate hacking campaigns, one by a group linked to the Preventive Security Service (PSS), an intelligence and law enforcement agency established by Palestine's ruling party in the West Bank Fatah; and another one called Arid Viper, which other security researchers have linked to Hamas, the governing authority in Gaza. Facebook wrote in its report that the company "cannot conclusively confirm this connection based on our evidence." 

Advertisement

“To us this looks like a targeted campaign that’s aimed at compromising people’s devices primarily for surveillance,” David Agranovich, the director of threat disruption at Facebook, told Motherboard in a phone call. 

The hacker group Facebook suggested is linked to the PSS "originated in the West Bank and focused on the Palestinian territories and Syria, and to a lesser extent Turkey, Iraq, Lebanon and Libya." Their goal was to trick people into clicking on malicious links and to get them to install malware on their devices. This group targeted "journalists, people opposing the Fatah-led government, human rights activists and military groups including the Syrian opposition and Iraqi military," according to Facebook. 

Facebook said Arid Viper activity "originated in Palestine" and created dozens of fake Facebook and Instagram profiles to target people who work in the Palestinian National Authority, Fatah, the PSS, several ministries, student groups, and other government employees. The hackers used phishing messages to lure targets into visiting fake websites—a total of 41—that advertised malicious versions of legitimate popular chat, banking, and dating apps. The hackers also created a fake chat app called MagicSmile. If the victims fell for it and downloaded the apps, they would install Android, iOS, or Windows malware, depending on what device they were using, according to Facebook. 

A screenshot of a malicious app made by Arid Viper hackers, which pretended to be a chat app. (Image: Facebook)

On iOS, the hackers did not use any zero-days, but rather relied on an increasingly popular technique to hack targets: use mobile configuration profiles, or MDM certificates. These require targets to go through several steps to install a profile that then lets the hackers install malware on the victim's iPhones. At that point, the hackers used a known exploit and a publicly available jailbreak to collect personal data from the compromised phones, according to Facebook.

The company said that it did not see evidence of widespread compromises, "which suggests Arid Viper sparingly used this malware," as Facebook wrote in its technical report. 

Do you research Arid Viper or other APT groups? We’d love to hear from you. Using a non-work phone or computer, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, lorenzofb on Wickr, OTR chat at lorenzofb@jabber.ccc.de, or email lorenzofb@vice.com

Agranovich said that Facebook will notify "just under 50 people that they were impacted by the Arid Viper threat actor," and "just under 800 people that they were impacted by the PSS-linked activity."

A screenshot of the MagicSmile malicious MDM profile that victims needed to install to allow hackers to take control of their device. (Image: Facebook)

Both the iOS and Android malware were designed to collect a large swath of personal data, such as photos, contacts, text messages, as well as record audio at any time, record calls, and track location data, according to Facebook.

Facebook researchers also observed new versions of Arid Viper's Windows malware. 

A Google spokesperson said that the company works "closely with others in the industry, including Facebook, on tracking threat actors. In this case, we have taken down associated domains, added domains to Safe Browsing blocklists and related accounts have been disabled."

Apple, and Microsoft did not respond to a request for comment. 

This story has been updated to include Google’s comment.

Subscribe to our cybersecurity podcast, CYBER.

Tagged:

SURVEILLANCE, Facebook, palestine, hamas, cybersecurity, CYBER, android, windows, iOS, Infosec, information security, worldnews

More
like this
Researchers Say 'Massive' MacOS Bug Was Exploited by Hackers
Hackers Tricked Microsoft Into Certifying Malware That Could Spy on Users
Israel Is a Cyber Superpower But Chooses Bombs to Fight Hackers in Gaza
Hackers Posing as The United Nations Hacked Uyghur Muslims
Hackers Used Fake GPU Overclocking Software to Push Malware
Google Wants to Make Everyone Use Two Factor Authentication
Prosecutors Suspend Government Spyware Used in WhatsApp Phishing Attacks
Professor Says Being Impersonated by Iranian Hackers Was Stressful But Good For Networking