• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
hackers targeting human rights activists in morocco and western sahara

Hackers Targeting Human Rights Activists in Morocco and Western Sahara

You are here: Home / General Cyber Security News / Hackers Targeting Human Rights Activists in Morocco and Western Sahara
April 9, 2024

Human rights activists in Morocco and the Western Sahara region are the targets of a new risk actor that leverages phishing attacks to trick victims into setting up bogus Android apps and provide credential harvesting webpages for Windows people.

Cisco Talos is tracking the action cluster under the name Starry Addax, describing it as principally singling out activists involved with the Sahrawi Arab Democratic Republic (SADR).

Starry Addax’s infrastructure – ondroid[.]site and ondroid[.]retail outlet – is intended to concentrate on both of those Android and Windows consumers, with the latter involving bogus internet websites masquerading as login web pages for common social media internet websites.

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


Cybersecurity

The adversary, believed to be energetic considering that January 2024, is identified to send spear-phishing email messages to targets, urging recipients to set up Sahara Press Service’s cellular app or a applicable decoy associated to the region.

Based on the working method from exactly where the ask for is originating from, the goal is either served a destructive APK that impersonates the Sahara Press Company or redirected to a social media login web site to harvest their qualifications.

Starry Addax Hackers

The novel Android malware, dubbed FlexStarling, is multipurpose and geared up to produce supplemental malware elements and steal sensitive information from contaminated products.

As soon as put in, it requests the victim to grant it in depth permissions that allow for the malware to perform nefarious steps, like fetching commands to be executed from a Firebase-based mostly command-and-regulate (C2), a signal that the danger actor is looking to fly underneath the radar.

“Strategies like this that goal superior-worth individuals ordinarily intend to sit quietly on the gadget for an extended interval,” Talos reported.

Cybersecurity

“All components from the malware to the running infrastructure seem to be to be bespoke/tailor made-manufactured for this precise campaign indicating a hefty concentrate on stealth and conducting activities underneath the radar.”

The advancement will come amid the emergence of a new commercial Android remote entry trojan (RAT) known as Oxycorat that is being presented for sale with varied information gathering abilities.

Identified this article interesting? Abide by us on Twitter  and LinkedIn to read far more unique information we publish.


Some parts of this posting are sourced from:
thehackernews.com

Previous Post: «researchers discover lg smart tv vulnerabilities allowing root access Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
Next Post: 10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet 10 year old 'rubycarp' romanian hacker group surfaces with botnet»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Discord Invite Link Hijacking Delivers AsyncRAT and Skuld Stealer Targeting Crypto Wallets
  • Over 269,000 Websites Infected with JSFireTruck JavaScript Malware in One Month
  • Ransomware Gangs Exploit Unpatched SimpleHelp Flaws to Target Victims with Double Extortion
  • CTEM is the New SOC: Shifting from Monitoring Alerts to Measuring Risk
  • Apple Zero-Click Flaw in Messages Exploited to Spy on Journalists Using Paragon Spyware
  • WordPress Sites Turned Weapon: How VexTrio and Affiliates Run a Global Scam Network
  • New TokenBreak Attack Bypasses AI Moderation with Single-Character Text Changes
  • AI Agents Run on Secret Accounts — Learn How to Secure Them in This Webinar
  • Zero-Click AI Vulnerability Exposes Microsoft 365 Copilot Data Without User Interaction
  • Non-Human Identities: How to Address the Expanding Security Risk

Copyright © TheCyberSecurity.News, All Rights Reserved.