🚀 ProPicks AI Hits +34.9% Return!Read Now

'Mercenary' hacker group runs rampant in Middle East, cybersecurity research shows

Published 07/10/2020, 15:29
Updated 07/10/2020, 17:20
© Reuters. Exteriors of the Saudi Embassy in Washington
GOOGL
-
BB
-
AAPL
-
GOOG
-
2222
-

By Raphael Satter and Christopher Bing

WASHINGTON (Reuters) - Saudi diplomats, Sikh separatists and Indian business executives have been among those targeted by a group of hired hackers, according to research published on Wednesday by software firm BlackBerry Corp.

The report https://www.blackberry.com/us/en/company/newsroom/press-releases/2020/blackberry-uncovers-massive-hack-for-hire-group-targeting-governments-businesses-human-rights-groups-and-influential-individuals on the group, known publicly as Bahamut, the name assigned to the mythical sea monster of Arab lore, highlights how cybersecurity researchers are increasingly finding evidence of mercenaries online.

BlackBerry's vice president of research, Eric Milam, said the diversity of Bahamut's activities was such that he assumed it was working for a range of different clients.

"There's too many different things going on across too many different ranges and too many different verticals that it would be a single state," Milam said ahead of the report's release.

In June, Reuters reported on how an obscure Indian IT firm called BellTroX https://www.reuters.com/article/idUSKBN23G1GQ offered its hacking services to help clients spy on more than 10,000 email accounts over seven years, including targeting prominent American investors.

BlackBerry - which absorbed antivirus firm Cylance in 2019 - stitched together digital clues left by other researchers over the years to create a picture of a sophisticated group of hackers. BlackBerry also linked the group to mobile phone applications in the Apple (NASDAQ:AAPL) and Google (NASDAQ:GOOGL) app stores. Those apps, which included a fitness tracker and password manager, may have helped the hackers track their targets, the report said.

A Google spokesman said all the apps in the Google Play Store mentioned in the report had been removed. Apple said two of the seven apps were no longer in its App Store and that it was not provided with enough information about the remaining programs to judge whether they were malicious.

Milam declined to comment on who he thought might be behind Bahamut, but he said he hoped the report would help to sharpen the focus on hackers-for-hire.

Taha Karim, the chief executive of Emirati cybersecurity company tephracore - who was not involved in BlackBerry's research but reviewed the report ahead of publication - said the findings were credible and "they found links that aren't obvious."

THE TARGETS

BlackBerry did not name any of Bahamut's targets directly, but researchers have previously publicly identified Middle Eastern human rights activists, Pakistani military officials, and Gulf Arab businessmen as being in the group's crosshairs. Reuters was also able to identify new targets by cross-referencing data published in BlackBerry's report with boobytrapped webpages preserved by urlscan.io, a cybersecurity tool.

One heavily targeted organization included the New York-based Sikhs for Justice, a separatist group that's campaigning for an independent homeland for Sikhs in India. Its founder, Gurpatwant Singh Pannun, said his campaign websites have been repeatedly hacked and his emails broken into.

Others pursued by the hackers included: The United Arab Emirates' Ministry of Defense, its Supreme Council for National Security, and Shaima Gargash, the Emirates' No. 2 diplomat in Washington.

In an email, Gargash said the embassy had no comment.

Saudi officials were also targeted by the hackers. Cached phishing pages preserved by services such as urlscan and reviewed by Reuters showed that the cyber spies targeted Mawthouq, the Saudi government's email service, half a dozen Saudi government ministries, and the Saudi Center for International Strategic Partnerships, a Riyadh-based body aimed at helping coordinate the petrostate's foreign policy.

The Saudi Embassy in Washington declined comment.

The hackers pursued royals and business executives in Bahrain, Kuwait, and Qatar. In August 2019 they attempted to compromise an employee of major Indian energy conglomerate Reliance Industries around the time that the company was negotiating the sale of a stake in its oil-to-chemicals business to Saudi Aramco (SE:2222).

© Reuters. Exteriors of the Saudi Embassy in Washington

Reliance did not return repeated messages. Attempts to reach the hackers were unsuccessful.

Latest comments

Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
© 2007-2024 - Fusion Media Limited. All Rights Reserved.