🧵Today we shared our latest threat research and analysis into two separate cyber-espionage groups in Palestine, including threat indicators. We linked one cluster to the Preventive Security Service (PSS) and another to a threat actor known as Arid Viper. https://about.fb.com/news/2021/04/taking-action-against-hackers-in-palestine/
2/ As far as we know, this is the first public reporting of the PSS activity, mainly targeting people in the Palestinian territories and Syria. They used their own low-sophistication malware disguised as secure chat applications + open-source malware tools.
3/ With our blog post, @Mdvily’s team is also sharing a deep-dive technical report on the Arid Viper activity and how this actor responded to enforcement by us and others in the industry over time https://about.fb.com/wp-content/uploads/2021/04/Technical-threat-report-Arid-Viper-April-2021.pdf
4/ We saw Arid Viper use sprawling infrastructure to support its operations, including over a hundred websites that either hosted iOS and Android malware, attempted to steal credentials through phishing or acted as command and control servers.
6/ We’ve been tracking and disrupting these networks throughout the course of our investigation, and today’s announcement and accompanying threat report are an anthology of the insights we’ve gained which hopefully are helpful to the broader security research community.
7/ In addition to our enforcement, we shared information about this activity with industry peers and the security research community and alerted people who we believe were targeted by both groups. [end thread]
You can follow @DavidAgranovich.
Tip: mention @twtextapp on a Twitter thread with the keyword “unroll” to get a link to it.

Latest Threads Unrolled: