Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware

Share:

As many as 25 websites linked to the Kurdish minority have been compromised as part of a watering hole attack designed to harvest sensitive information for over a year and a half.

French cybersecurity firm Sekoia, which disclosed details of the campaign dubbed SilentSelfie, described the intrusion set as long-running, with first signs of infection detected as far back as December 2022.

The strategic web compromises are designed to deliver four different variants of an information-stealing framework, it added.

“These ranged from the simplest, which merely stole the user’s location, to more complex ones that recorded images from the selfie camera and led selected users to install a malicious APK, i.e an application used on Android,” security researchers Felix Aimé and Maxime A said in a Wednesday report.

Targeted websites include Kurdish press and media, Rojava administration and its armed forces, those related to revolutionary far-left political parties, and organizations in Türkiye and Kurdish regions. Sekoia told The Hacker News that the exact method by which these websites were breached in the first place remains uncertain.

The attacks have not been attributed to any known threat actor or entity, indicating the emergence of a new threat cluster targeting the Kurdish community, which has been previously singled out by groups like StrongPity and BladeHawk.

Earlier this year, Dutch security firm Hunt & Hackett also revealed that Kurdish websites in the Netherlands were singled out by a Türkiye-nexus threat actor known as Sea Turtle.

The watering hole attacks are characterized by the deployment of a malicious JavaScript that’s responsible for gathering various kinds of information from site visitors, including their location, device data (e.g., number of CPUs, battery status, browser language, etc.), and public IP address, among others.

Watering Hole Attack

One variant of the reconnaissance script found on three websites (rojnews[.]news, hawarnews[.]com, and targetplatform[.]net.) has also been observed redirecting users to rogue Android APK files, while some others include the ability for user tracking via a cookie named “sessionIdVal.”

The Android app, per Sekoia’s analysis, embeds the website itself as a WebView, while also clandestinely hoovering system information, contact lists, location, and files present in the external storage based on the permissions granted to it.

“It is worth noting that this malicious code doesn’t have any persistence mechanism but is only executed when the user opens the RojNews application,” the researchers pointed out.

“Once the user opens the application, and after 10 seconds, the LocationHelper service starts beaconning the background to the URL rojnews[.]news/wp-includes/sitemaps/ via HTTP POST requests, sharing the current location of the user and waiting for commands to execute.”

Not much is known about who is behind SilentSelfie, but Sekoia has assessed that it could be the handiwork of the Kurdistan Regional Government of Iraq based on the arrest of RojNews journalist Silêman Ehmed by KDP forces in October 2023. He was sentenced to three years in prison in July 2024.

“Even though this watering hole campaign is of low sophistication, it is notable for the number of kurdish websites affected and its duration,” the researchers said. “The campaign’s low level of sophistication suggests it might be the work of an uncovered threat actor with limited capabilities and relatively new to the field.”

Ravie Lakshmanan

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
3:32 am, Jul 14, 2025
weather icon 19°C
L: 18° | H: 20°
overcast clouds
Humidity: 75 %
Pressure: 1011 mb
Wind: 8 mph ESE
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 100%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:59 am
Sunset: 9:12 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
18° | 20°°C 0 mm 0% 18 mph 76 % 1015 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
15° | 20°°C 1 mm 100% 15 mph 78 % 1016 mb 0 mm/h
Wed Jul 16 10:00 pm
weather icon
14° | 27°°C 0.2 mm 20% 14 mph 73 % 1017 mb 0 mm/h
Thu Jul 17 10:00 pm
weather icon
18° | 26°°C 1 mm 100% 8 mph 80 % 1017 mb 0 mm/h
Fri Jul 18 10:00 pm
weather icon
19° | 30°°C 0 mm 0% 12 mph 79 % 1015 mb 0 mm/h
Today 4:00 am
weather icon
18° | 19°°C 0 mm 0% 7 mph 75 % 1011 mb 0 mm/h
Today 7:00 am
weather icon
17° | 19°°C 0 mm 0% 9 mph 76 % 1011 mb 0 mm/h
Today 10:00 am
weather icon
20° | 20°°C 0 mm 0% 11 mph 59 % 1012 mb 0 mm/h
Today 1:00 pm
weather icon
23° | 23°°C 0 mm 0% 15 mph 39 % 1013 mb 0 mm/h
Today 4:00 pm
weather icon
25° | 25°°C 0 mm 0% 18 mph 28 % 1013 mb 0 mm/h
Today 7:00 pm
weather icon
22° | 22°°C 0 mm 0% 15 mph 30 % 1013 mb 0 mm/h
Today 10:00 pm
weather icon
19° | 19°°C 0 mm 0% 9 mph 45 % 1015 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0 mm 0% 8 mph 61 % 1016 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€102,040.77
1.52%
Ethereum(ETH)
€2,553.91
1.38%
XRP(XRP)
€2.45
4.06%
Tether(USDT)
€0.86
0.00%
Solana(SOL)
€139.58
1.24%
USDC(USDC)
€0.86
0.00%
Dogecoin(DOGE)
€0.171480
1.68%
Shiba Inu(SHIB)
€0.000011
2.16%
Pepe(PEPE)
€0.000010
0.93%
Peanut the Squirrel(PNUT)
€0.244556
5.81%
Scroll to Top