Meta

Taking Action Against Hackers in Palestine

Today, we’re sharing actions we took against two separate groups of hackers in Palestine — a network linked to the Preventive Security Service (PSS) and a threat actor known as Arid Viper — removing their ability to use their infrastructure to abuse our platform, distribute malware and hack people’s accounts across the internet. To the best of our knowledge, this is the first public reporting of this PSS activity.

Facebook threat intelligence analysts and security experts work to find and stop a wide range of threats including cyber espionage campaigns, influence operations and hacking of our platform by nation-state actors and other groups. As part of these efforts, our teams routinely disrupt adversary operations by disabling them, notifying people if they should take steps to protect their accounts, sharing our findings publicly and continuing to improve the security of our products.

Today we’re sharing our latest research into two clusters of unconnected cyber espionage activity. One of them targeted primarily domestic audiences in Palestine. The other cluster targeted audiences in the Palestinian territories and Syria and to a lesser extent Turkey, Iraq, Lebanon and Libya.

To disrupt both these operations, we took down their accounts, released malware hashes, blocked domains associated with their activity and alerted people who we believe were targeted by these groups to help them secure their accounts. We shared information with our industry partners including the anti-virus community so they too can detect and stop this activity, strengthening our collective response against these groups across the internet. We encourage people to remain vigilant and take steps to protect their accounts, avoid clicking on suspicious links and downloading software from untrusted sources that can compromise their devices and information stored on them.

The groups behind these operations are persistent adversaries, and we know they will evolve their tactics in response to our enforcement. However, we keep improving our detection systems and collaborating with other teams in the security community to continue making it harder for these threat actors to remain undetected. We’ll keep sharing our findings when possible so people are aware of the threats we’re seeing and can take steps to strengthen the security of their accounts.

Here’s What We Found

PSS-Linked Group

This activity originated in the West Bank and focused on the Palestinian territories and Syria, and to a lesser extent Turkey, Iraq, Lebanon and Libya. It relied on social engineering to trick people into clicking on malicious links and installing malware on their devices. Our investigation found links to the Preventive Security Service — the Palestinian Authority’s internal intelligence organization.

This persistent threat actor focused on a wide range of targets, including journalists, people opposing the Fatah-led government, human rights activists and military groups including the Syrian opposition and Iraqi military. They used their own low-sophistication malware disguised as secure chat applications, in addition to malware tools openly available on the internet.

Our investigation analyzed a number of notable tactics, techniques and procedures (TTPs):

Threat Indicators:

Android C2 Domains

news-fbcb4.firebaseio[.]com
news-fbcb4.appspot[.]com
chaty-98547.firebaseio[.]com
chaty-98547.appspot[.]com
jamila-c8420.firebaseio[.]com
jamila-c8420.appspot[.]com
showra-22501.firebaseio[.]com
showra-22501.appspot[.]com
goodwork-25869.firebaseio[.]com
goodwork-25869.appspot[.]com
advance-chat-app.firebaseio[.]com
advance-chat-app.appspot[.]com
filtersapp-715ee.firebaseio[.]com
filtersapp-715ee.appspot[.]com
humanrights-1398b.firebaseio[.]com
humanrights-1398b.appspot[.]com
jamilabouhaird-c0935.firebaseio[.]com
jamilabouhaird-c0935.appspot[.]com
hotchat-f0c0e.appspot[.]com
hotnewchat.appspot[.]com

Android Hashes


aeb0c38219e714ab881d0065b9fc1915ba84ad5b86916a82814d056f1dfaf66d
3c21c0f64ef7b606abb73b9574d0d66895e180e6d1cf2ad21addd5ade79b69fb
d2787aff6e827809b836e62b06cca68bec92b3e2144f132a0015ce397cf3cac2
2580f7afb4746b223b14aceab76bd8bc2e4366bfa55ebf203de2715176032525
f7ea82e4c329bf8e29e9da37fcaf35201dd79c2fc55cc0feb88aedf0b2d26ec2
0540051935145fb1e3f9361ec55b62a759ce6796c1f355249805d186046328dc
03de278ec4c4855b885520a377f8b1df462a1d8a4b57b492b3b052aafe509793
fe77e052dc1a8ebea389bc0d017191e0f41d8e47d034c30df95e3d0dc33cfe10
6356d55c79a82829c949a46c762f9bb4ca53da01a304b13b362a8a9cab20d4d2
9a53506c429fa4ff9113b2cbd37d96c708b4ebb8f3424c1b7f6b05ef678f2230
bf61c078157dd7523cb580672273190de5de3d41577f5d66c5afcdfeade09213
154cb010e8ac4c50a47f4b218c133b5c7d059f5aff4c2820486e0ae511966e89
44ccafb69e61139d9107a87f58133c43b8586931faf620c38c1824057d66d614

SpyNote C2

lion20810397.ddns[.]net

Windows Malware C2 Domains

camera.dvrcam[.]info
facebooks.ddns[.]me
google.loginto[.]me

Windows Malware Hashes

05320c7348c156f0a98907d2b1527ff080eae36437d58735f2822d9f42f5d273

Links to Android Malware

app-chat1.atwebpages[.]com
app-showchat.atwebpages[.]com
showra-chat.atwebpages[.]com

Arid Viper

This activity originated in Palestine and targeted individuals in the same region, including government officials, members of the Fatah political party, student groups and security forces. Our investigation linked this campaign to Arid Viper, a known advanced persistent threat actor. It used sprawling infrastructure to support its operations, including over a hundred websites that either hosted iOS and Android malware, attempted to steal credentials through phishing or acted as command and control servers.

They appear to operate across multiple internet services, using a combination of social engineering, phishing websites and continually evolving Windows and Android malware in targeted cyber espionage campaigns.

We shared threat indicators with industry peers and security researchers as part of a concerted effort to disrupt this group’s operations. We’re also sharing a detailed technical report with our findings, including threat indicators to help advance our industry’s understanding of this adversary (below).

Here are our key findings and some of the notable tactics, techniques and procedures (TTPs) we’ve observed:

Custom iOS Surveillanceware:

Evolving Android and Windows Malware

Malware Distribution

Compromise Flow:

See the full Threat Report on Arid Viper for more information and IOCs.