Watering Hole-Angriff auf kurdische Websites, die bösartige APKs und Spyware verteilen

Teilen:

As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and a half.

French cybersecurity firm Sekoia, which disclosed details of the campaign dubbed SilentSelfie, described the intrusion set as long-running, with first signs of infection detected as far back as December 2022.

The strategic web compromises are designed to deliver four different variants of an information-stealing framework, it added.

“These ranged from the simplest, which merely stole the user’s location, to more complex ones that recorded images from the selfie camera and led selected users to install a malicious APK, i.e an application used on Android,” security researchers Felix Aimé and Maxime A said in a Wednesday report.

Targeted websites include Kurdish press and media, Rojava administration and its armed forces, those related to revolutionary far-left political parties, and organizations in Türkiye and Kurdish regions. Sekoia told The Hacker News that the exact method by which these websites were breached in the first place remains uncertain.

The attacks have not been attributed to any known threat actor or entity, indicating the emergence of a new threat cluster targeting the Kurdish community, which has been previously singled out by groups like StrongPity and BladeHawk.

Earlier this year, Dutch security firm Hunt & Hackett also revealed that Kurdish websites in the Netherlands were singled out by a Türkiye-nexus threat actor known as Sea Turtle.

The watering hole attacks are characterized by the deployment of a malicious JavaScript that’s responsible for gathering various kinds of information from site visitors, including their location, device data (e.g., number of CPUs, battery status, browser language, etc.), and public IP address, among others.

Watering Hole Attack

One variant of the reconnaissance script found on three websites (rojnews[.]news, hawarnews[.]com, and targetplatform[.]net.) has also been observed redirecting users to rogue Android APK files, while some others include the ability for user tracking via a cookie named “sessionIdVal.”

The Android app, per Sekoia’s analysis, embeds the website itself as a WebView, while also clandestinely hoovering system information, contact lists, location, and files present in the external storage based on the permissions granted to it.

“It is worth noting that this malicious code doesn’t have any persistence mechanism but is only executed when the user opens the RojNews application,” the researchers pointed out.

“Once the user opens the application, and after 10 seconds, the LocationHelper service starts beaconning the background to the URL rojnews[.]news/wp-includes/sitemaps/ via HTTP POST requests, sharing the current location of the user and waiting for commands to execute.”

Not much is known about who is behind SilentSelfie, but Sekoia has assessed that it could be the handiwork of the Kurdistan Regional Government of Iraq based on the arrest of RojNews journalist Silêman Ehmed by KDP forces in October 2023. He was sentenced to three years in prison in July 2024.

“Even though this watering hole campaign is of low sophistication, it is notable for the number of kurdish websites affected and its duration,” the researchers said. “The campaign’s low level of sophistication suggests it might be the work of an uncovered threat actor with limited capabilities and relatively new to the field.”

Ravie Lakshmanan

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
8:02 pm, Juni 30, 2025
Wetter-Symbol 30°C
L: 28° | H: 31°
klarer Himmel
Luftfeuchtigkeit: 42 %
Druck: 1014 mb
Wind: 8 mph S
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 0%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:46 am
Sonnenuntergang: 9:21 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
28° | 31°°C 0 mm 0% 3 mph 44 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
20° | 33°°C 0 mm 0% 11 mph 64 % 1016 mb 0 mm/h
Mi. Juli 02 10:00 pm
Wetter-Symbol
18° | 23°°C 0.38 mm 38% 12 mph 80 % 1023 mb 0 mm/h
Do. Juli 03 10:00 pm
Wetter-Symbol
15° | 26°°C 0 mm 0% 6 mph 76 % 1028 mb 0 mm/h
Fr. Juli 04 10:00 pm
Wetter-Symbol
16° | 28°°C 0 mm 0% 11 mph 55 % 1027 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
24° | 28°°C 0 mm 0% 3 mph 44 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
23° | 25°°C 0 mm 0% 3 mph 51 % 1015 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
20° | 20°°C 0 mm 0% 3 mph 64 % 1014 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
22° | 22°°C 0 mm 0% 5 mph 61 % 1014 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
28° | 28°°C 0 mm 0% 3 mph 44 % 1014 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
30° | 30°°C 0 mm 0% 6 mph 32 % 1014 mb 0 mm/h
Tomorrow 4:00 pm
Wetter-Symbol
33° | 33°°C 0 mm 0% 8 mph 27 % 1013 mb 0 mm/h
Tomorrow 7:00 pm
Wetter-Symbol
32° | 32°°C 0 mm 0% 11 mph 29 % 1013 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€91,484.12
-0.38%
Ethereum(ETH)
€2,120.85
1.92%
Fesseln(USDT)
€0.85
0.01%
XRP(XRP)
€1.89
1.44%
Solana(SOL)
€132.93
2.55%
USDC(USDC)
€0.85
0.01%
Dogecoin(DOGE)
€0.140396
-0.08%
Shiba Inu(SHIB)
€0.000009
-1.35%
Pepe(PEPE)
€0.000009
1.21%
Nach oben scrollen