Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Amnesty Links Indian Cybersecurity Firm to Spyware Attack on African Activist

Human rights organization Amnesty International last week reported identifying a link between an Indian cybersecurity company and the infrastructure used by a hacking group in an attack that attempted to deliver Android and Windows spyware to an activist in the West African country of Togo.

Human rights organization Amnesty International last week reported identifying a link between an Indian cybersecurity company and the infrastructure used by a hacking group in an attack that attempted to deliver Android and Windows spyware to an activist in the West African country of Togo.

In late 2019 and early 2020, ahead of the presidential elections in Togo, the Donot Team hacking group attempted to spy on a prominent Togolese human rights defender, but only managed to raise the victim’s suspicion.

Active since at least 2012 and also tracked as APT-C-35, and SectorE02, Donot Team is mainly known for its focus on targets in India, Pakistan, China, and other Asian countries. For the past couple of years, however, it has shifted focus to additional geographies, including Argentina, UAE, and the UK.

While this is the first reported Donot Team attack against an individual in West Africa, it is not the first cyberattack against activists in Togo, who have long been the target of shadowy cyber-mercenaries.

During their investigation into the cyberattack against a prominent Togolese activist, Amnesty International discovered a connection between Donot Team’s Android spyware and Innefu Labs Pvt. Ltd., an Indian cybersecurity company that claims to provide services to law enforcement.

“Amnesty International found two key pieces of evidence connecting Innefu Labs to the Donot Team Android spyware and to the specific infrastructure used to deliver the Android spyware to the HRD in Togo,” the human rights organization says.

On a Donot Team server, Amnesty International found a screenshot from an infected Android device that showed the use of a website used to send spyware to the Togolese activist and an IP address tied to Innefu Labs. Furthermore, the same IP address was found in a log file publicly exposed on said website.

Thus, the Innefu Labs IP address is linked to the infrastructure used for the distribution of Donot Team spyware in the attacks targeting the human rights activist in Togo, Amnesty International notes.

Advertisement. Scroll to continue reading.

The organization also says that it has additional evidence that Innefu Labs is involved in the development of Donot Team spyware, although it’s unclear whether the Indian company was indeed involved in the targeting of the activist in Togo.

“The activity linked to the Donot Team may involve multiple distinct actors or organisations with access to the same custom spyware toolset. The identity of all individuals or groups involved with Donot Team activity is unknown,” Amnesty International explains.

Innefu Labs, however, has refuted Amnesty International’s allegations, saying it is in no manner connected to the Donot Team or the attack against the Togolese activist, and claiming that it was not aware of its IP address being used for said activities.

“There is no evidence to suggest Innefu Labs had a direct involvement or knowledge of the targeting of the human rights defender in Togo using the Donot Team spyware tools,” Amnesty International says.

Related: Activists Launch Action Against ‘Cookie Banner Terror’

Related: One Year After Europe’s Schrems II Decision, Privacy Activist Bemoans Lack of Progress

Related: ProtonMail (Wrongly?) Criticized for Disclosing User IP to Authorities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Cyberwarfare

An engineer recruited by intelligence services reportedly used a water pump to deliver Stuxnet, which reportedly cost $1-2 billion to develop.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...