Skip to main content

iCloud backups targeted in hack-for-hire operation using fake Apple pages

A new investigation shows that hackers are still relying on old tricks to break into iPhones and Android devices. Here are the details.

’A growing trend of government agencies outsourcing their hacking operations’

As spotted by TechCrunch, three cybersecurity research companies collaborated to produce complementary reports detailing a years-long hack-for-hire campaign targeting journalists, activists, and officials across the Middle East and North Africa.

According to findings shared by Access Now, Lookout, and SMEX, the attacks targeted civilians and government officials in several countries, most of them in the region, in addition to “the United Kingdom, and potentially the United States or alumni of American universities,” per TechCrunch.

Access Now investigated three attack events that took place between 2023 and 2025, while Lookout linked them to the hack-for-hire group BITTER APT, “an offshoot of the Indian hack-for-hire startup Appin”.

Contrary to the Coruna exploit and DarkSword exploit attacks, which recently drew attention for their intricate chaining of known vulnerabilities to compromise outdated iPhones and iPads, this campaign relied on far less sophisticated tactics, including phishing:

“In the attacks part of this campaign, the hackers used several different techniques. When targeting iPhone users, the hackers tried to trick targets into giving up their Apple ID credentials in order to then hack into their iCloud backups, which effectively would have given them access to the full content of the targets’ iPhones.“

Lookout’s report includes nearly 1,500 different web addresses designed to impersonate legitimate services, but used to host phishing pages and other malicious infrastructure.

The ones specific to Apple included:

  • facetime-web[.]me-en[.]io
  • apple[.]id-us[.]cc
  • icloud[.]com-ar[.]me
  • icloud[.]com-service[.]info
  • signin-apple[.]com-en-uk[.]info

As noted in the reports, the campaign went far beyond Apple, also targeting users and services from companies such as Google, Microsoft, Signal, WhatsApp, and Yahoo, with different hacking and phishing techniques.

TechCrunch added that this campaign marks a “growing trend of government agencies outsourcing their hacking operations to private hack-for-hire companies”:

These groups and their customers get “plausible deniability since they run all the operations and infrastructure.” And for their customers, these hack-for-hire groups are likely cheaper than purchasing commercial spyware, said [Justin Albrecht, principal researcher at Lookout].

You can find TechCrunch’s report here.

Worth checking out on Amazon

FTC: We use income earning auto affiliate links. More.

You’re reading 9to5Mac — experts who break news about Apple and its surrounding ecosystem, day after day. Be sure to check out our homepage for all the latest news, and follow 9to5Mac on Twitter, Facebook, and LinkedIn to stay in the loop. Don’t know where to start? Check out our exclusive stories, reviews, how-tos, and subscribe to our YouTube channel

Comments

Author

Avatar for Marcus Mendes Marcus Mendes

Marcus Mendes is a Brazilian tech podcaster and journalist who has been closely following Apple since the mid-2000s.

He began covering Apple news in Brazilian media in 2012 and later broadened his focus to the wider tech industry, hosting a daily podcast for seven years.