Dark
Light

Moroccan and Western Sahara activists at risk of hacker attacks

1 min read
64 views



TLDR:

Human rights activists in Morocco and Western Sahara are being targeted by hackers using phishing attacks to install bogus Android apps and steal credentials. The threat actor, known as Starry Addax, has been active since January 2024 and is using a novel Android malware called FlexStarling. The malware is designed to fly under the radar and steal sensitive information. This comes at a time when a new commercial Android RAT known as Oxycorat is being offered for sale.

Article:

Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users. Cisco Talos is tracking the activity cluster under the name Starry Addax, describing it as primarily singling out activists associated with the Sahrawi Arab Democratic Republic (SADR). Starry Addax’s infrastructure – ondroid[.]site and ondroid[.]store – is designed to target both Android and Windows users, with the latter involving fake websites masquerading as login pages for popular social media websites.

The adversary, believed to be active since January 2024, is known to send spear-phishing emails to targets, urging recipients to install Sahara Press Service’s mobile app or a relevant decoy related to the region. Depending on the operating system from where the request is originating from, the target is either served a malicious APK that impersonates the Sahara Press Service or redirected to a social media login page to harvest their credentials. The novel Android malware, dubbed FlexStarling, is versatile and equipped to deliver additional malware components and steal sensitive information from infected devices. Once installed, it requests the victim to grant it extensive permissions that allow the malware to perform nefarious actions, including fetching commands to be executed from a Firebase-based command-and-control (C2), a sign that the threat actor is looking to fly under the radar.

Campaigns like this that target high-value individuals usually intend to sit quietly on the device for an extended period,” Talos said. “All components from the malware to the operating infrastructure seem to be bespoke/custom-made for this specific campaign indicating a heavy focus on stealth and conducting activities under the radar.” The development comes amid the emergence of a new commercial Android remote access trojan (RAT) known as Oxycorat that’s being offered for sale with diverse information gathering capabilities.

Overall, the hacking campaign targeting human rights activists in Morocco and Western Sahara highlights the ongoing threat posed by sophisticated threat actors using phishing attacks and malware to infiltrate and steal sensitive information from targeted individuals. This serves as a reminder of the importance of cybersecurity measures and vigilance in protecting against such threats.


Previous Story

Tehran triples hacks with help from Hezbollah

Next Story

Boost your cyber resilience with these top tips from Olusegun

Latest from News