Skip to content
Tech News
← Back to articles

iCloud backups targeted in hack-for-hire operation using fake Apple pages

read original get Apple iCloud Security Key → more articles
Why This Matters

This investigation highlights how hackers continue to exploit basic phishing techniques, such as fake Apple pages, to access sensitive user data via iCloud backups. The findings underscore the ongoing vulnerabilities in mobile device security and the importance of user vigilance and improved security measures. For consumers and the tech industry, it emphasizes the need for stronger defenses against even seemingly simple cyberattacks.

Key Takeaways

A new investigation shows that hackers are still relying on old tricks to break into iPhones and Android devices. Here are the details.

’A growing trend of government agencies outsourcing their hacking operations’

As spotted by TechCrunch, three cybersecurity research companies collaborated to produce complementary reports detailing a years-long hack-for-hire campaign targeting journalists, activists, and officials across the Middle East and North Africa.

According to findings shared by Access Now, Lookout, and SMEX, the attacks targeted civilians and government officials in several countries, most of them in the region, in addition to “the United Kingdom, and potentially the United States or alumni of American universities,” per TechCrunch.

Access Now investigated three attack events that took place between 2023 and 2025, while Lookout linked them to the hack-for-hire group BITTER APT, “an offshoot of the Indian hack-for-hire startup Appin”.

Contrary to the Coruna exploit and DarkSword exploit attacks, which recently drew attention for their intricate chaining of known vulnerabilities to compromise outdated iPhones and iPads, this campaign relied on far less sophisticated tactics, including phishing:

“In the attacks part of this campaign, the hackers used several different techniques. When targeting iPhone users, the hackers tried to trick targets into giving up their Apple ID credentials in order to then hack into their iCloud backups, which effectively would have given them access to the full content of the targets’ iPhones.“

Lookout’s report includes nearly 1,500 different web addresses designed to impersonate legitimate services, but used to host phishing pages and other malicious infrastructure.

The ones specific to Apple included:

facetime-web[.]me-en[.]io

... continue reading