{"id":3489265,"date":"2026-04-08T18:51:20","date_gmt":"2026-04-08T18:51:20","guid":{"rendered":"https:\/\/techingeek.com\/index.php\/2026\/04\/08\/hack-for-hire-team-apprehended-aiming-at-android-gadgets-and-icloud-backups\/"},"modified":"2026-04-08T18:51:20","modified_gmt":"2026-04-08T18:51:20","slug":"hack-for-hire-team-apprehended-aiming-at-android-gadgets-and-icloud-backups","status":"publish","type":"post","link":"https:\/\/techingeek.com\/index.php\/2026\/04\/08\/hack-for-hire-team-apprehended-aiming-at-android-gadgets-and-icloud-backups\/","title":{"rendered":"Hack-for-hire team apprehended aiming at Android gadgets and iCloud backups"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/techingeek.com\/wp-content\/uploads\/2026\/04\/hack-for-hire-team-apprehended-aiming-at-android-gadgets-and-icloud-backups.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Cybersecurity experts report that they have uncovered a hack-for-hire organization aimed at journalists, activists, and government officials in the Middle East and North Africa. The attackers executed phishing strategies to breach targets\u2019 iCloud backups and messaging platforms on Signal, utilizing Android spyware capable of seizing control of the targets\u2019 devices.<\/p>\n<p class=\"wp-block-paragraph\">This hacking initiative underscores a rising pattern of government bodies delegating their hacking efforts to private hack-for-hire firms. Certain governments already depend on commercial entities that create spyware and exploits utilized by law enforcement and intelligence organizations to obtain data from individuals&#8217; mobile devices.<\/p>\n<p class=\"wp-block-paragraph\">Researchers from the digital rights group Access Now noted three instances of attacks from 2023 to 2025 involving two Egyptian journalists, along with a journalist in Lebanon whose situation was also reported by the digital rights organization SMEX.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The mobile cybersecurity firm Lookout also examined these assaults. The three organizations collaborated and released independent reports on Wednesday.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Lookout indicated that the attacks extend beyond Egyptian and Lebanese civil society members and include individuals within the Bahraini and Egyptian administrations, along with targets in the United Arab Emirates, Saudi Arabia, the United Kingdom, and potentially the United States or graduates of American institutions.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Lookout concluded that the perpetrators behind this spying venture are affiliated with a hack-for-hire firm linked to BITTER APT, a hacking collective that cybersecurity firms believe has connections to the Indian government.<\/p>\n<p class=\"wp-block-paragraph\">Justin Albrecht, principal researcher at Lookout, informed TechCrunch that the firm behind the operation may be an offshoot of the Indian hack-for-hire company Appin, mentioning a specific company named RebSec as a likely candidate. In 2022 and 2023, Reuters conducted thorough investigations into Appin and other similar Indian firms, revealing how these companies are allegedly contracted to hack corporate leaders, politicians, military personnel, and more.\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">Appin apparently subsequently ceased operations, but Albrecht highlighted that the emergence of this new hacking campaign indicates that their activities \u201cdidn\u2019t vanish; they merely transitioned to smaller firms.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">These organizations and their clients receive \u201cplausible deniability since they manage all the operations and infrastructure.\u201d Furthermore, for their clients, these hack-for-hire entities are often less expensive than acquiring commercial spyware, Albrecht stated.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Rebsec could not be contacted for comments, as the firm has erased its social media profiles and website.\u00a0<\/p>\n<div class=\"article-block block--callout block--right has-green-500-background-color\">\n<h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\t\tDo you possess more information about Rebsec Solutions? Or other hack-for-hire firms? From a non-work device, you can reach out to Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.\t\t<\/p><\/div>\n<p class=\"wp-block-paragraph\">\u2068Mohammed Al-Maskati\u2069, an investigator and director at Access Now\u2019s Digital Security Helpline who handled these situations, mentioned that \u201cthese operations have become less costly and evading accountability is feasible, particularly since the end customer remains unknown, and the infrastructure will not disclose the entity behind it.\u201d<\/p>\n<p class=\"wp-block-paragraph\">While groups like BITTER may lack the most sophisticated hacking and espionage tools, their strategies can still prove to be quite effective.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In the attacks associated with this campaign, the hackers employed various techniques. When focusing on iPhone users, the attackers attempted to deceive targets into revealing their Apple ID information to subsequently infiltrate their iCloud backups, effectively granting them access to the complete contents of the targets\u2019 iPhones.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">This presents \u201cpotentially a more affordable alternative to the employment of more advanced and costly iOS spyware,\u201d according to Access Now.<\/p>\n<p class=\"wp-block-paragraph\">When targeting Android users, the attackers utilized spyware known as ProSpy, disguising it as popular messaging and communication applications such as Signal, WhatsApp, and Zoom, along with ToTok and Botim, two applications favored in the Middle East.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In some instances, the hackers attempted to deceive victims into registering and attaching a new device \u2014 under their control \u2014 to their Signal account, a method that has gained popularity among various hacking collectives, including Russian spies.<\/p>\n<p class=\"wp-block-paragraph\">A representative for the Indian embassy in Washington, D.C. did not promptly respond to a request for remarks.<\/p>\n","protected":false},"excerpt":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/techingeek.com\/wp-content\/uploads\/2026\/04\/hack-for-hire-team-apprehended-aiming-at-android-gadgets-and-icloud-backups.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Cybersecurity experts report that they have uncovered a hack-for-hire organization aimed at journalists, activists, and government officials in the Middle East and North Africa. The attackers executed phishing strategies to breach targets\u2019 iCloud backups and messaging platforms on Signal, utilizing Android spyware capable of seizing control of the targets\u2019 devices.<\/p>\n<p class=\"wp-block-paragraph\">This hacking initiative underscores a rising pattern of government bodies delegating their hacking efforts to private hack-for-hire firms. Certain governments already depend on commercial entities that create spyware and exploits utilized by law enforcement and intelligence organizations to obtain data from individuals&#8217; mobile devices.<\/p>\n<p class=\"wp-block-paragraph\">Researchers from the digital rights group Access Now noted three instances of attacks from 2023 to 2025 involving two Egyptian journalists, along with a journalist in Lebanon whose situation was also reported by the digital rights organization SMEX.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">The mobile cybersecurity firm Lookout also examined these assaults. The three organizations collaborated and released independent reports on Wednesday.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Lookout indicated that the attacks extend beyond Egyptian and Lebanese civil society members and include individuals within the Bahraini and Egyptian administrations, along with targets in the United Arab Emirates, Saudi Arabia, the United Kingdom, and potentially the United States or graduates of American institutions.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Lookout concluded that the perpetrators behind this spying venture are affiliated with a hack-for-hire firm linked to BITTER APT, a hacking collective that cybersecurity firms believe has connections to the Indian government.<\/p>\n<p class=\"wp-block-paragraph\">Justin Albrecht, principal researcher at Lookout, informed TechCrunch that the firm behind the operation may be an offshoot of the Indian hack-for-hire company Appin, mentioning a specific company named RebSec as a likely candidate. In 2022 and 2023, Reuters conducted thorough investigations into Appin and other similar Indian firms, revealing how these companies are allegedly contracted to hack corporate leaders, politicians, military personnel, and more.\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n<div class=\"inline-cta__wrapper\">\n<p>Techcrunch event<\/p>\n<div class=\"inline-cta__content\">\n<p>\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"wp-block-paragraph\">Appin apparently subsequently ceased operations, but Albrecht highlighted that the emergence of this new hacking campaign indicates that their activities \u201cdidn\u2019t vanish; they merely transitioned to smaller firms.\u201d\u00a0<\/p>\n<p class=\"wp-block-paragraph\">These organizations and their clients receive \u201cplausible deniability since they manage all the operations and infrastructure.\u201d Furthermore, for their clients, these hack-for-hire entities are often less expensive than acquiring commercial spyware, Albrecht stated.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">Rebsec could not be contacted for comments, as the firm has erased its social media profiles and website.\u00a0<\/p>\n<div class=\"article-block block--callout block--right has-green-500-background-color\">\n<h4 class=\"block--callout__title\">Contact Us<\/h4>\n<p>\t\t\tDo you possess more information about Rebsec Solutions? Or other hack-for-hire firms? From a non-work device, you can reach out to Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or email.\t\t<\/p><\/div>\n<p class=\"wp-block-paragraph\">\u2068Mohammed Al-Maskati\u2069, an investigator and director at Access Now\u2019s Digital Security Helpline who handled these situations, mentioned that \u201cthese operations have become less costly and evading accountability is feasible, particularly since the end customer remains unknown, and the infrastructure will not disclose the entity behind it.\u201d<\/p>\n<p class=\"wp-block-paragraph\">While groups like BITTER may lack the most sophisticated hacking and espionage tools, their strategies can still prove to be quite effective.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In the attacks associated with this campaign, the hackers employed various techniques. When focusing on iPhone users, the attackers attempted to deceive targets into revealing their Apple ID information to subsequently infiltrate their iCloud backups, effectively granting them access to the complete contents of the targets\u2019 iPhones.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">This presents \u201cpotentially a more affordable alternative to the employment of more advanced and costly iOS spyware,\u201d according to Access Now.<\/p>\n<p class=\"wp-block-paragraph\">When targeting Android users, the attackers utilized spyware known as ProSpy, disguising it as popular messaging and communication applications such as Signal, WhatsApp, and Zoom, along with ToTok and Botim, two applications favored in the Middle East.\u00a0<\/p>\n<p class=\"wp-block-paragraph\">In some instances, the hackers attempted to deceive victims into registering and attaching a new device \u2014 under their control \u2014 to their Signal account, a method that has gained popularity among various hacking collectives, including Russian spies.<\/p>\n<p class=\"wp-block-paragraph\">A representative for the Indian embassy in Washington, D.C. did not promptly respond to a request for remarks.<\/p>\n","protected":false},"author":2,"featured_media":3489266,"comment_status":"open","ping_status":"closed","sticky":false,"template":"Default","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3489265","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts\/3489265"}],"collection":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/comments?post=3489265"}],"version-history":[{"count":0,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/posts\/3489265\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/media\/3489266"}],"wp:attachment":[{"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/media?parent=3489265"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/categories?post=3489265"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techingeek.com\/index.php\/wp-json\/wp\/v2\/tags?post=3489265"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}