Watering Hole Attack on Kurdish Sites Distributing Malicious APKs and Spyware

Over the past year and a half, as many as 25 websites linked to the Kurdish minority have fallen victim to a sophisticated watering hole attack designed to steal sensitive information. This cyber espionage campaign, dubbed SilentSelfie, was uncovered by French cybersecurity firm Sekoia, which described the operation as long-running and strategic. The first signs of infection were detected in December 2022, highlighting the persistent nature of the attack.

The Watering Hole Attack and Its Tactics

Watering hole attacks are a type of cyberattack where hackers compromise specific websites commonly visited by a targeted group. Once a user visits the infected website, malicious code is executed on their device, often leading to the theft of sensitive information. In this case, the Kurdish community—particularly websites connected to Kurdish press, media outlets, political groups, and armed forces—has been the primary target.

Sekoia’s research uncovered that the SilentSelfie campaign used four different variants of an information-stealing framework. The sophistication of the attacks varied, ranging from stealing basic location data to more complex intrusions that accessed a user's selfie camera, recorded images, and led selected users to download a malicious Android APK file. This APK, once installed, acted as a tool to harvest detailed system information from Android devices, including contact lists, location data, and files stored in external storage.

Targeted Websites and Breach Methodology

Among the compromised websites were Kurdish news outlets such as RojNews and Hawar News, as well as others related to revolutionary political movements in Türkiye and Kurdish regions. The precise method by which these websites were initially breached remains uncertain. However, security researchers Felix Aimé and Maxime A from Sekoia noted that the level of infection across these sites indicates a concerted effort to infiltrate this community, pointing to an advanced and prolonged attack.

Sekoia also identified malicious JavaScript deployed on several compromised websites, which allowed hackers to gather a wide range of information from visitors, including device data, public IP addresses, battery status, and browser language. Some of the scripts redirected users to download malicious Android APK files, while others tracked users through a cookie labeled "sessionIdVal".

The Role of Malicious APKs

One of the more insidious aspects of the SilentSelfie campaign was the deployment of malicious APK files. When users downloaded and installed the APK, it embedded the targeted website into a WebView, enabling the hackers to continue stealing data while appearing legitimate. The app collected extensive data from infected devices, including the user’s location, contact lists, and files stored in external storage.

While the malicious code did not have a persistence mechanism—meaning it didn’t automatically execute upon device startup—it was triggered each time the user opened the compromised RojNews application. After a brief 10-second delay, the app initiated a LocationHelper service that transmitted the user’s location to a URL linked to the RojNews website, allowing hackers to issue commands to the device.

Attribution and Threat Actors

Despite the extensive investigation, the SilentSelfie campaign has not yet been attributed to any known hacking groups. However, Sekoia researchers have suggested a possible connection to the Kurdistan Regional Government of Iraq based on the arrest of RojNews journalist Silêman Ehmed in October 2023 by the Kurdistan Democratic Party (KDP) forces. Ehmed was sentenced to three years in prison in July 2024, raising suspicions that the campaign could be linked to political motivations.

This hypothesis aligns with past incidents where Kurdish websites were targeted. For example, earlier in 2024, Dutch security firm Hunt & Hackett uncovered a similar watering hole attack that affected Kurdish websites in the Netherlands. This attack was attributed to Sea Turtle, a threat actor with connections to Türkiye. While there is no direct evidence linking the SilentSelfie campaign to Sea Turtle, both incidents suggest a pattern of politically motivated cyberattacks targeting the Kurdish minority.

Low Sophistication, High Impact

Despite the large scale of the SilentSelfie campaign, Sekoia researchers described the attack as “low sophistication.” The information-stealing framework lacked advanced persistence mechanisms or other highly sophisticated techniques commonly seen in modern cyber espionage campaigns. Nevertheless, the sheer number of websites compromised and the campaign’s long duration—spanning more than 18 months—underscore its significance.

The researchers emphasized that although the campaign appeared to be the work of an emerging or less experienced threat actor, its impact on the Kurdish community was substantial. The extended timeline of the attack allowed the perpetrators to gather sensitive data on users visiting these websites, potentially aiding in the surveillance and targeting of political dissidents or minority groups.

Conclusion

The SilentSelfie watering hole attack is a stark reminder of the vulnerabilities faced by minority communities in the digital age. While the attack may not be as technically advanced as others, its scale and duration make it a significant threat, particularly to the Kurdish community. As cyberattacks become increasingly political, vigilance and cybersecurity measures must be strengthened to protect at-risk groups from such targeted campaigns.

Although the exact identity of the attackers behind SilentSelfie remains unclear, the attack's focus on Kurdish websites and political entities suggests that this emerging threat cluster may have broader geopolitical motivations. As this campaign continues to evolve, cybersecurity experts will need to remain alert to further developments and potential connections to known threat actors.


Similar Articles
Image Description
cyber security North Korean Hackers Use LinkedIn to Target Crypto Sector with RustDoor Malware

Cybersecurity researchers have uncovered a North Korean campaign using LinkedIn to deliver the RustDoor malware, targeting cryptocurrency fir ...

  • By DragonX Team

  • Updated Sep 16, 2024

Over the past year and a half, as many as 25 websites linked to the Kurdish minority have fallen victim to a sophisticated watering hole attack designed to steal sensitive information. This cyber espionage campaign, dubbed SilentSelfie, was uncovered by French cybersecurity firm Sekoia, which described the operation as long-running and strategic. The first signs of infection were detected in December 2022, highlighting the persistent nature of the attack.

The Watering Hole Attack and Its Tactics

Watering hole attacks are a type of cyberattack where hackers compromise specific websites commonly visited by a targeted group. Once a user visits the infected website, malicious code is executed on their device, often leading to the theft of sensitive information. In this case, the Kurdish community—particularly websites connected to Kurdish press, media outlets, political groups, and armed forces—has been the primary target.

Sekoia’s research uncovered that the SilentSelfie campaign used four different variants of an information-stealing framework. The sophistication of the attacks varied, ranging from stealing basic location data to more complex intrusions that accessed a user's selfie camera, recorded images, and led selected users to download a malicious Android APK file. This APK, once installed, acted as a tool to harvest detailed system information from Android devices, including contact lists, location data, and files stored in external storage.

Targeted Websites and Breach Methodology

Among the compromised websites were Kurdish news outlets such as RojNews and Hawar News, as well as others related to revolutionary political movements in Türkiye and Kurdish regions. The precise method by which these websites were initially breached remains uncertain. However, security researchers Felix Aimé and Maxime A from Sekoia noted that the level of infection across these sites indicates a concerted effort to infiltrate this community, pointing to an advanced and prolonged attack.

Sekoia also identified malicious JavaScript deployed on several compromised websites, which allowed hackers to gather a wide range of information from visitors, including device data, public IP addresses, battery status, and browser language. Some of the scripts redirected users to download malicious Android APK files, while others tracked users through a cookie labeled "sessionIdVal".

The Role of Malicious APKs

One of the more insidious aspects of the SilentSelfie campaign was the deployment of malicious APK files. When users downloaded and installed the APK, it embedded the targeted website into a WebView, enabling the hackers to continue stealing data while appearing legitimate. The app collected extensive data from infected devices, including the user’s location, contact lists, and files stored in external storage.

While the malicious code did not have a persistence mechanism—meaning it didn’t automatically execute upon device startup—it was triggered each time the user opened the compromised RojNews application. After a brief 10-second delay, the app initiated a LocationHelper service that transmitted the user’s location to a URL linked to the RojNews website, allowing hackers to issue commands to the device.

Attribution and Threat Actors

Despite the extensive investigation, the SilentSelfie campaign has not yet been attributed to any known hacking groups. However, Sekoia researchers have suggested a possible connection to the Kurdistan Regional Government of Iraq based on the arrest of RojNews journalist Silêman Ehmed in October 2023 by the Kurdistan Democratic Party (KDP) forces. Ehmed was sentenced to three years in prison in July 2024, raising suspicions that the campaign could be linked to political motivations.

This hypothesis aligns with past incidents where Kurdish websites were targeted. For example, earlier in 2024, Dutch security firm Hunt & Hackett uncovered a similar watering hole attack that affected Kurdish websites in the Netherlands. This attack was attributed to Sea Turtle, a threat actor with connections to Türkiye. While there is no direct evidence linking the SilentSelfie campaign to Sea Turtle, both incidents suggest a pattern of politically motivated cyberattacks targeting the Kurdish minority.

Low Sophistication, High Impact

Despite the large scale of the SilentSelfie campaign, Sekoia researchers described the attack as “low sophistication.” The information-stealing framework lacked advanced persistence mechanisms or other highly sophisticated techniques commonly seen in modern cyber espionage campaigns. Nevertheless, the sheer number of websites compromised and the campaign’s long duration—spanning more than 18 months—underscore its significance.

The researchers emphasized that although the campaign appeared to be the work of an emerging or less experienced threat actor, its impact on the Kurdish community was substantial. The extended timeline of the attack allowed the perpetrators to gather sensitive data on users visiting these websites, potentially aiding in the surveillance and targeting of political dissidents or minority groups.

Conclusion

The SilentSelfie watering hole attack is a stark reminder of the vulnerabilities faced by minority communities in the digital age. While the attack may not be as technically advanced as others, its scale and duration make it a significant threat, particularly to the Kurdish community. As cyberattacks become increasingly political, vigilance and cybersecurity measures must be strengthened to protect at-risk groups from such targeted campaigns.

Although the exact identity of the attackers behind SilentSelfie remains unclear, the attack's focus on Kurdish websites and political entities suggests that this emerging threat cluster may have broader geopolitical motivations. As this campaign continues to evolve, cybersecurity experts will need to remain alert to further developments and potential connections to known threat actors.


Similar Articles
Image Description
Mobile Security Massive Campaign Targets Exposed Git Configurations to Steal Credentials and Clone Repositories

Learn how a large-scale campaign exploits exposed Git configurations to steal credentials and clone repositories. Understand the risks, tacti ...

  • By DragonX Team

  • Updated Nov 09, 2024

Cyber Attack

Over the past year and a half, as many as 25 websites linked to the Kurdish minority have fallen victim to a sophisticated watering hole attack designed to steal sensitive information. This cyber espionage campaign, dubbed SilentSelfie, was uncovered by French cybersecurity firm Sekoia, which described the operation as long-running and strategic. The first signs of infection were detected in December 2022, highlighting the persistent nature of the attack.

The Watering Hole Attack and Its Tactics

Watering hole attacks are a type of cyberattack where hackers compromise specific websites commonly visited by a targeted group. Once a user visits the infected website, malicious code is executed on their device, often leading to the theft of sensitive information. In this case, the Kurdish community—particularly websites connected to Kurdish press, media outlets, political groups, and armed forces—has been the primary target.

Sekoia’s research uncovered that the SilentSelfie campaign used four different variants of an information-stealing framework. The sophistication of the attacks varied, ranging from stealing basic location data to more complex intrusions that accessed a user's selfie camera, recorded images, and led selected users to download a malicious Android APK file. This APK, once installed, acted as a tool to harvest detailed system information from Android devices, including contact lists, location data, and files stored in external storage.

Targeted Websites and Breach Methodology

Among the compromised websites were Kurdish news outlets such as RojNews and Hawar News, as well as others related to revolutionary political movements in Türkiye and Kurdish regions. The precise method by which these websites were initially breached remains uncertain. However, security researchers Felix Aimé and Maxime A from Sekoia noted that the level of infection across these sites indicates a concerted effort to infiltrate this community, pointing to an advanced and prolonged attack.

Sekoia also identified malicious JavaScript deployed on several compromised websites, which allowed hackers to gather a wide range of information from visitors, including device data, public IP addresses, battery status, and browser language. Some of the scripts redirected users to download malicious Android APK files, while others tracked users through a cookie labeled "sessionIdVal".

The Role of Malicious APKs

One of the more insidious aspects of the SilentSelfie campaign was the deployment of malicious APK files. When users downloaded and installed the APK, it embedded the targeted website into a WebView, enabling the hackers to continue stealing data while appearing legitimate. The app collected extensive data from infected devices, including the user’s location, contact lists, and files stored in external storage.

While the malicious code did not have a persistence mechanism—meaning it didn’t automatically execute upon device startup—it was triggered each time the user opened the compromised RojNews application. After a brief 10-second delay, the app initiated a LocationHelper service that transmitted the user’s location to a URL linked to the RojNews website, allowing hackers to issue commands to the device.

Attribution and Threat Actors

Despite the extensive investigation, the SilentSelfie campaign has not yet been attributed to any known hacking groups. However, Sekoia researchers have suggested a possible connection to the Kurdistan Regional Government of Iraq based on the arrest of RojNews journalist Silêman Ehmed in October 2023 by the Kurdistan Democratic Party (KDP) forces. Ehmed was sentenced to three years in prison in July 2024, raising suspicions that the campaign could be linked to political motivations.

This hypothesis aligns with past incidents where Kurdish websites were targeted. For example, earlier in 2024, Dutch security firm Hunt & Hackett uncovered a similar watering hole attack that affected Kurdish websites in the Netherlands. This attack was attributed to Sea Turtle, a threat actor with connections to Türkiye. While there is no direct evidence linking the SilentSelfie campaign to Sea Turtle, both incidents suggest a pattern of politically motivated cyberattacks targeting the Kurdish minority.

Low Sophistication, High Impact

Despite the large scale of the SilentSelfie campaign, Sekoia researchers described the attack as “low sophistication.” The information-stealing framework lacked advanced persistence mechanisms or other highly sophisticated techniques commonly seen in modern cyber espionage campaigns. Nevertheless, the sheer number of websites compromised and the campaign’s long duration—spanning more than 18 months—underscore its significance.

The researchers emphasized that although the campaign appeared to be the work of an emerging or less experienced threat actor, its impact on the Kurdish community was substantial. The extended timeline of the attack allowed the perpetrators to gather sensitive data on users visiting these websites, potentially aiding in the surveillance and targeting of political dissidents or minority groups.

Conclusion

The SilentSelfie watering hole attack is a stark reminder of the vulnerabilities faced by minority communities in the digital age. While the attack may not be as technically advanced as others, its scale and duration make it a significant threat, particularly to the Kurdish community. As cyberattacks become increasingly political, vigilance and cybersecurity measures must be strengthened to protect at-risk groups from such targeted campaigns.

Although the exact identity of the attackers behind SilentSelfie remains unclear, the attack's focus on Kurdish websites and political entities suggests that this emerging threat cluster may have broader geopolitical motivations. As this campaign continues to evolve, cybersecurity experts will need to remain alert to further developments and potential connections to known threat actors.


Similar Articles
Image Description
Cyber Attack Following the election, DDoS assaults persist against Meduza, an autonomous media outlet in Russia.

The first attack started on April 15 and lasted about 48 hours. Over those two days, Meduza's website was targeted by 2 billion fake use ...

  • By DragonX Team

  • Updated Apr 30, 2024



Latest News and Updates

Latest News

  • Android's New Identity Check Feature Locks Device Settings Outside Trusted Locations

    1

    Posted Date Jan 25, 2025

    Android's New Identity...

    Google has launched a new...
  • DoJ Indicts 5 Individuals for $866K North Korean IT Worker Scheme Violations

    2

    Posted Date Jan 25, 2025

    DoJ Indicts 5...

    The U.S. Department of Justice...
  • RANsacked: Over 100 Security Flaws Found in LTE and 5G Network Implementations

    3

    Posted Date Jan 25, 2025

    RANsacked: Over 100...

    A group of academics has...
  • Beware: Fake CAPTCHA Campaign Spreads Lumma Stealer in Multi-Industry Attacks

    4

    Posted Date Jan 24, 2025

    Beware: Fake CAPTCHA...

    Cybersecurity researchers are calling attention...
  • Palo Alto Firewalls Found Vulnerable to Secure Boot Bypass and Firmware Exploits

    5

    Posted Date Jan 24, 2025

    Palo Alto Firewalls...

    An exhaustive evaluation of three...
X
DragonX Cookie Policy

At DragonX, we employ cookies on our website to enhance the site, providing the best service and customer experience possible

Category

Necessary (Always active)

These cookies enable essential site features like secure log-in and consent preference adjustments, without storing any personally identifiable data

Functional

This category aids in specific functions such as sharing website content on social media platforms, receiving feedback, and incorporating third-party features

Analytics

Analytical cookies are utilized to comprehend visitor interactions on the website, offering insights into metrics like visitor numbers, bounce rates, and traffic sources

Performance

These cookies help in understanding and analyzing important performance indicators of the website to enhance the user experience

Advertisement

Tailored advertisements are provided to visitors based on previously visited pages, while also evaluating the effectiveness of ad campaigns