Hack-for-hire strikes again.
A Middle East hack-for-hire operation just got pinned on Bitter APT, a South Asian cyber espionage crew that’s been lurking since 2013. Picture this: prominent Egyptian journalists Mostafa Al-A’sar and Ahmed Eltantawy—both government critics with prison stints—get hit with tailored phishing in 2023 and 2024. Access Now’s Digital Security Helpline spots it in August 2025. They dig in, find Android malware, loop in Lookout. Boom: ties to Bitter, aka T-APT-17.
Bitter’s rap sheet? Government, energy, engineering targets in Pakistan, China, Bangladesh, Saudi Arabia—per MITRE ATT&CK. Now they’re freelancing for Mideast paymasters, likely. ESET clocks two Android spyware strains, ProSpy and ToSpy, posing as messaging apps, aimed at UAE users in October 2025. Lookout says it’s the same kit used here.
The Phishing Playbook: Slick and Persistent
Attackers didn’t blast spam. No, they built rapport—fake profiles mimicking legit contacts, services. Signal got spoofed. Apple too. Al-A’sar bites on what looks like an Apple alert, punches credentials. Then—2FA ping from some random Egyptian spot. He freezes. Smart move. Eltantawy? Ignores it entirely. Fail for the hackers.
But here’s the chilling part. Success means full dive into Apple/Google accounts: family deets, sources, everything. That ProSpy/ToSpy? Grabs files, contacts, SMS, GPS, even flips on mic and camera. Installs more junk. Access Now nails it:
“If they had been successful, they would have gained unimpeded access to the personal and professional information in the targets’ Apple and/or Google accounts, including information on their families, associates and journalistic sources.”
Lebanese angle ramps it up. SMEX in Beirut flags a high-profile journo in 2025. Starts May, Apple Messages lure. Two days later, WhatsApp double-tap. First one lands—Apple account breached, virtual device added. Victim reports days late, forensics thin. Second? Fizzles, but they snag creds: username, pass, 2FA. Takeover in 30 seconds flat.
Same infrastructure across all. Bahrain gov, UAE, Saudi, UK, even Egyptian entities on the list. Lookout’s betting it’s wider.
Why Target Journalists Now?
Journalists aren’t random. They’re megaphones for dissent in tight regimes. Egypt’s Al-A’sar and Eltantawy? Locked up before for their pens. Lebanon? Chaos, but critics still vanish or worse. Hack-for-hire’s cheap—Bitter’s not state-only; they rent out. My take: this echoes Pegasus heyday, but democratized. NSO charged millions; Bitter? Probably peanuts for Mideast intel budgets. Unique angle—watch for Bitter’s pivot to iOS. Android’s their jam, but Apple breaches here scream evolution. Prediction: by 2027, they’ll crack full cross-platform, flooding helplines.
Data backs the skepticism. MITRE logs Bitter’s overlaps with other South Asian APTs—tool reuse screams mercenary ecosystem. Not some lone genius; it’s a market. Clients pay, operators scale. Mideast’s oil cash flows easy.
Is Bitter’s Reach Expanding Too Fast?
Fast? Understatement. 2013 debut, now UAE, Bahrain, beyond. ESET report October 2025 ties ProSpy/ToSpy to UAE hits. Access Now drops full deets April 8, 2026—wait, timelines blur, but persistence shines. Signal warns March 2026 on impersonations. Too late for some.
Look at the economics. State actors outsource to dodge blowback—Pegasus fallout killed NSO deals. Bitter? Low profile, deniable. Saudi, UAE? They’ve got form with mercs. Bahrain too. UK’s on the list—odd, but embassy angles? Egypt self-targeting? Nah, likely rivals stirring.
One-paragraph wonder: Victims dodged bullets through sheer luck and quick wits—Al-A’sar spotting that 2FA oddity—but one Lebanese hack proves the edge cases kill.
Defenders scramble. Access Now, SMEX—heroes, really. But scale? NGOs can’t match. Lookout, ESET fill gaps, yet attribution’s fuzzy: “most likely” Bitter. No smoking gun, just overlaps. That’s the game—plausible deniability pays.
Lessons from the Frontlines: What Broke, What Held
Phishing’s old-school reliable. Impersonate Apple? Genius in low-awareness zones. 2FA? Helps, but devs in 30 seconds laugh it off. Android spyware’s the payload—sideloading via fakes. iOS tougher, but account takeovers bypass.
Sharp critique: Signal’s warning came post-facto. Platforms lag. Apple, Google—beef up anomaly alerts. Egypt IP for Al-A’sar? Red flag city.
Historical parallel? Remember FinSpy in 2010s Mideast? Gamma Group’s merc tool. Same playbook, cheaper now. Bold call: Bitter undercuts all, sparking a hack-for-hire price war. Watch Indian-Pak tensions fuel it—South Asia’s grudge economy exports pain.
Why Does This Matter for Digital Rights?
Civil society’s the canary. Journalists fall, activists next. Access Now’s helpline? Overloaded. SMEX’s Digital Forensics Lab raced the clock—May 25 report, but breach days old.
Market dynamic: Threat intel firms like Lookout profit—new reports, briefings. But real win? Targets training up. Eltantawy’s non-engagement? Gold standard.
And the PR spin? None here—straight NGO reporting. No gov denials yet. Silence screams complicity.
🧬 Related Insights
- Read more: Three China-Aligned Hack Clusters Pile Onto One Southeast Asian Government Network
- Read more: Venom PhaaS Powers Ruthless Credential Grabs from C-Suite Targets
Frequently Asked Questions
What is Bitter APT and its targets?
Bitter, or T-APT-17, is a South Asian espionage group hitting govs, energy in Pakistan, China, Saudi since 2013. Now freelancing Mideast hack-for-hire.
Who got hit in the Middle East hack-for-hire?
Egyptian journalists Mostafa Al-A’sar, Ahmed Eltantawy; unnamed Lebanese reporter. Likely Bahrain, UAE, Saudi too.
How does ProSpy spyware work?
Android implant steals files, contacts, location, activates mic/camera. Delivered via phishing faking Signal, Apple, WhatsApp.