The Pakistani group – known in the security industry as SideCopy – targeted people who were linked to the previous Afghan government, military and law enforcement in Kabul, Meta said in a statement. .
“Given the ongoing crisis and the collapse of the government at the time, we moved quickly to complete the investigation and take action to protect the people on our platform, share our findings with our peers from industry, law enforcement and researchers, and alert those we believe were targeted, “the company statement said.
The statement added that this malicious activity has the hallmarks of a well-funded and persistent operation while masking who is behind it. On Facebook, this cyber-espionage campaign intensified between April and August 2021 and was mainly manifested by the sharing of links to malicious websites hosting malware.
This Pakistani group created fictional characters – usually young women – as romantic lures to build trust with potential targets and trick them into clicking phishing links or downloading malicious chat apps.
They were operating bogus app stores and also compromised legitimate websites to host malicious phishing pages to trick people into giving up their Facebook credentials.
SideCopy has attempted to trick people into installing trojanized chat apps, including messengers masquerading as Viber and Signal, or custom Android apps that contain malware to compromise devices.
Separately, Meta said it took action against “three separate hacker groups with ties to the Syrian government,” including a group known as the Syrian Electronic Army, which was linked to the intelligence services of the Syrian Arab Republic. Syrian Air Force; and APT-C-37, a hacker organization that targeted opposition groups.
(This story was not edited by DAILYNEWSCATCH staff and is auto-generated from a syndicated feed.)