Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Privacy

Facebook Says Palestinian Intelligence Used Platform to Spy on Citizens

Facebook said Wednesday it had disabled accounts used by the Palestinian Authority’s internal intelligence organisation to spy on journalists, human rights activists and political opponents.

Facebook said Wednesday it had disabled accounts used by the Palestinian Authority’s internal intelligence organisation to spy on journalists, human rights activists and political opponents.

In a report, the US social media giant also said it had identified and disabled “politically motivated” espionage operations by a group believed to be based in Gaza and affiliated with Hamas, the Islamist rulers of the Palestinian enclave.

The report released Wednesday comes ahead of landmark Palestinian legislative elections set for next month that will see the rival West Bank-based Palestinian Authority (PA) and Hamas facing off for the first time in 15 years.

According to Facebook, the PA’s Preventive Security Service (PSS) targeted “journalists, people opposing the Fatah-led government, human rights activists and military groups,” primarily in the West Bank, Gaza and Syria, “and to a lesser extent Turkey, Iraq, Lebanon and Libya”.

Operating from the West Bank, the operatives used “low-sophistication malware disguised as secure chat applications” to infiltrate Android devices and collect information from them, including “call logs, location, contacts and text messages,” the report said.

The PSS also created a fake application to which journalists were invited to submit “human rights-related articles for publication”, according to the Facebook cyber espionage and threat investigators who penned the report.

In addition, the intelligence service used false accounts posing primarily as young women but also “as supporters of Hamas, Fatah, various military groups, journalists and activists” in order “to build trust with people they targeted and trick them into installing malicious software”.

The report also noted what it called “state-sponsored cyber espionage operations” believed to be “politically motivated” by the so-called Arid Viper group.

Advertisement. Scroll to continue reading.

Independent researchers say the group has been launching cyber attacks from Gaza towards Israel since 2013.

Arid Viper’s target this time, however, was not Israel, rather Palestinians, including “individuals associated with pro-Fatah groups, Palestinian government organisations, military and security personnel, and student groups within Palestine,” Facebook said.

Arid Viper used “over a hundred websites that either hosted iOS and Android malware, attempted to steal credentials through phishing or acted as command and control servers,” the report said.

“They appear to operate across multiple internet services, using a combination of social engineering, phishing websites and continually evolving Windows and Android malware in targeted cyber espionage campaigns,” it added.

Facebook said it had taken down the accounts affiliated with both the PSS and Arid Viper, “released malware hashes, blocked domains associated with their activity and alerted people” targeted.

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Mike Dube has joined cloud security company Aqua Security as CRO.

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

More People On The Move

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Artificial Intelligence

The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...

Artificial Intelligence

Two of humanity’s greatest drivers, greed and curiosity, will push AI development forward. Our only hope is that we can control it.

Cybercrime

Daniel Kelley was just 18 years old when he was arrested and charged on thirty counts – most infamously for the 2015 hack of...

Cybercrime

The top five categories of Bad Bot attacks are fake account creation, account takeovers, scraping, account management, and in-product abuse.

Cybercrime

No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.