For victims of cyber crime where personal data is stolen, it is often impossible to know who was behind the attack and what the motive might have been, without expert analysis. This file photo shows a member of the hacking group Red Hacker Alliance in Dongguan, China. AFP
For victims of cyber crime where personal data is stolen, it is often impossible to know who was behind the attack and what the motive might have been, without expert analysis. This file photo shows a member of the hacking group Red Hacker Alliance in Dongguan, China. AFP
For victims of cyber crime where personal data is stolen, it is often impossible to know who was behind the attack and what the motive might have been, without expert analysis. This file photo shows a member of the hacking group Red Hacker Alliance in Dongguan, China. AFP
For victims of cyber crime where personal data is stolen, it is often impossible to know who was behind the attack and what the motive might have been, without expert analysis. This file photo shows a

US cyber security company uncovers Middle East phishing campaign to steal data


  • English
  • Arabic

A hacking operation, possibly linked to a state-sponsored espionage operation, continues to operate across the Middle East, according to US cyber security company Cybereason.

Those responsible for the hacking operation are known as the Gaza Cybergang, also known as Molerats, and have targeted officials in the Palestinian territories, as well as elsewhere in the region.

Writing about the group last year, cyber security company Kaspersky claimed that “targets located within the Palestinian territories were very comfortably in the lead. Quite a few infection attempts also fell on Jordan, Israel, and Lebanon."

Cybereason says what is particularly concerning about the group's most recent tactics is that they make use of well-established platforms, including Facebook, Dropbox, Google Docs and Simplenote for command and control to directly target victims' computers for exfiltration of sensitive data.

Emotive themes

Similar to other recent hacking campaigns in the region, the group used sophisticated phishing tactics to fool unwitting users into downloading malware that allowed access to personal data.

"Themes like Israeli-Saudi relations, Hamas elections, news about Palestinian politicians, and other regional events" were all used to tempt message recipients into clicking on compromised links, according to Cybereason.

“While it’s no surprise to see threat actors take advantage of politically charged events to fuel their phishing campaigns, it is concerning to see an increase in social media platforms being used for issuing command and control instructions and other legitimate cloud services being used for data exfiltration activities,” said Lior Div, Cybereason co-founder and chief executive.

“This puts the onus even more on the defenders to be hypervigilant with regard to potentially malicious network traffic connecting to legitimate services,” he said.

In October, Microsoft said they had uncovered a campaign by Iran-backed group Phosphorus, which used similar, albeit arguably more sophisticated tactics.

Phosphorus tempted email recipients – many of them high-profile figures – with convincing fake invitations to major events related to Middle East politics, such as the Think 20 summit in Saudi Arabia and the Munich Security Conference.

Tom Burt, head of security at Microsoft, said some of the attempts were successful.

“We believe Phosphorus is engaging in these attacks for intelligence collection purposes. The attacks were successful in compromising several victims, including former ambassadors and other senior policy experts who help shape global agendas and foreign policies in their respective countries.”

While Phosphorus has been linked to the Iranian regime, it is not clear who is behind the Molerats group.

On Tuesday, US military official R Clarke Cooper said Washington was weighing the possibility of deploying “advanced capabilities” to the UAE following a blitz of Iranian cyberattacks against the Gulf nation. He did not specify what technology would be used.

Mr Cooper, who serves as assistant secretary of State for Political-Military Affairs, told reporters that the Pentagon may install anti-cyber gear to deter threats against the Emirates, where about 4,000 US servicemen are stationed.

“The UAE reports an increasing number of cyber threats following their participation in the Abraham Accord. This is consistent with what we are seeing elsewhere as Iran attempts to undermine the UAE’s cybersecurity,” said Mr Cooper.

“Thus, it is only natural the Trump administration would carefully consider and expedite where [to deploy] practical, certain advanced capabilities to deter threats, including to nearly 4,000 US service members based in the UAE.”

MATCH INFO

Chelsea 1 (Hudson-Odoi 90 1')

Manchester City 3 (Gundogan 18', Foden 21', De Bruyne 34')

Man of the match: Ilkay Gundogan (Man City)

Trump v Khan

2016: Feud begins after Khan criticised Trump’s proposed Muslim travel ban to US

2017: Trump criticises Khan’s ‘no reason to be alarmed’ response to London Bridge terror attacks

2019: Trump calls Khan a “stone cold loser” before first state visit

2019: Trump tweets about “Khan’s Londonistan”, calling him “a national disgrace”

2022:  Khan’s office attributes rise in Islamophobic abuse against the major to hostility stoked during Trump’s presidency

July 2025 During a golfing trip to Scotland, Trump calls Khan “a nasty person”

Sept 2025 Trump blames Khan for London’s “stabbings and the dirt and the filth”.

Dec 2025 Trump suggests migrants got Khan elected, calls him a “horrible, vicious, disgusting mayor”

What's in the deal?

Agreement aims to boost trade by £25.5bn a year in the long run, compared with a total of £42.6bn in 2024

India will slash levies on medical devices, machinery, cosmetics, soft drinks and lamb.

India will also cut automotive tariffs to 10% under a quota from over 100% currently.

Indian employees in the UK will receive three years exemption from social security payments

India expects 99% of exports to benefit from zero duty, raising opportunities for textiles, marine products, footwear and jewellery

Desert Warrior

Starring: Anthony Mackie, Aiysha Hart, Ben Kingsley

Director: Rupert Wyatt

Rating: 3/5

White hydrogen: Naturally occurring hydrogenChromite: Hard, metallic mineral containing iron oxide and chromium oxideUltramafic rocks: Dark-coloured rocks rich in magnesium or iron with very low silica contentOphiolite: A section of the earth’s crust, which is oceanic in nature that has since been uplifted and exposed on landOlivine: A commonly occurring magnesium iron silicate mineral that derives its name for its olive-green yellow-green colour

WHAT IS A BLACK HOLE?

1. Black holes are objects whose gravity is so strong not even light can escape their pull

2. They can be created when massive stars collapse under their own weight

3. Large black holes can also be formed when smaller ones collide and merge

4. The biggest black holes lurk at the centre of many galaxies, including our own

5. Astronomers believe that when the universe was very young, black holes affected how galaxies formed

DEADPOOL & WOLVERINE

Starring: Ryan Reynolds, Hugh Jackman, Emma Corrin

Director: Shawn Levy

Rating: 3/5