Hack-for-Hire Targets Egyptian Journalists

An email from a 'trusted source' dangles credentials and cash data. Two Egyptian journalists—jailed critics—fell prey to this hack-for-hire nightmare from 2023-2024.

Digital shadows over Cairo skyline with phishing email overlay targeting journalists

Key Takeaways

  • Sophisticated spear-phishing snagged credentials and financial data from two Egyptian journalists critical of the government.
  • Likely Asian threat actor, with one attack traced to Egypt; attribution remains uncertain.
  • Echoes broader MENA repression trends, outsourced cheaply via hack-for-hire markets.

Cairo traffic honking outside a dingy apartment, where a journalist checks his inbox late at night, unaware the hack-for-hire campaign lurking there could unravel his life.

I’ve chased digital shadows for two decades now, from Valley boardrooms to Middle East safehouses, and this latest report from Access Now’s Digital Security Helpline smells like the same old game—repression dressed up as cyber sleight-of-hand. Titled Espionage for repression: forensic analysis of a cross-border hack-for-hire campaign targeting civil society in MENA, it lays bare attacks on Mostafa Al-A’sar and Ahmed Eltantawy, two Egyptian voices who’ve tasted prison bars before. One even dodged spyware once. Spear-phishing emails mimicking legit folks and services snagged their credentials, financial info. Nasty stuff, spanning 2023 to 2024.

Look.

These aren’t script-kiddie pranks. Access Now teamed with Lookout, that mobile security outfit, and they’re pointing fingers at an Asian threat actor. Complex layers—proxies, faked origins—keep the real culprits foggy. Can’t pin it on a government with ironclad proof, but one email traced back to Egypt. Coincidence? Please.

The attacks — which used messages that appeared to be from legitimate people and services to obtain personal data including credentials and financial data from targets — were carried out from 2023 to 2024.

That’s straight from the report. Chilling precision.

Who’s Actually Profiting from This Hack-for-Hire Mess?

Here’s my cynical take, one you won’t find in the press release: this reeks of the underground economy that’s boomed since Pegasus scandals. Remember NSO Group? Israeli spyware kings, selling to autocrats for millions. But hack-for-hire? Cheaper. Deniable. No fancy zero-days needed—just a merc with a keyboard in Manila or Mumbai, billing by the breach. Who’s making bank? Not the journalists, that’s for damn sure. It’s the shadowy firms advertising on dark web forums: ‘Compromise targets, $5k per pop.’ Egypt’s regime—or proxies—outsources the dirty work, keeps hands clean. Access Now nods to a similar hit on a Lebanese journalist in 2025 via SMEX. Pattern emerging?

And yeah, they collaborated on that too. Reports from Lookout and SMEX paint the same actor. But attribution? Slippery as ever. Tech masks identities; geopolitics muddies motives.

Short para: Skeptical? Me too.

Why Can’t We Nail the Perpetrators Every Time?

Blame the toolkit. Spear-phishing thrives on trust—fake LinkedIn invites, bank alerts, colleague chats. Victims hand over keys willingly. Then VPN chains bounce signals across borders. Asian actor? Could be Indian hackers-for-hire, notorious for this, or Chinese cutouts. Egypt’s involved peripherally, but the big fish swim deeper.

I’ve seen this movie. Back in 2011, Arab Spring hacks targeted activists with FinFisher—German spyware peddled to dictators. Fast-forward (sorry, habit), and it’s evolved into freelance gigs. Prediction: without international bounties on these crews, it’ll spike. MENA civil society? Prime targets. Reporters Without Borders logs Egypt jailing 33 journalists last year. Digital hits fill the gaps.

Wander a bit: Think about the human cost. Al-A’sar and Eltantawy aren’t faceless. They’re the ones risking it all while we sip coffee in safe cities. One’s dodged Pegasus before—now this. Fatigue sets in; defenses drop.

Is Hack-for-Hire the New Normal for Repressive Regimes?

Damn right it is.

Cheaper than jamming signals or raiding offices. Governments (or their pals) tap global talent pools. Lookout’s forensics show polished ops—custom malware, data exfil. Not state-level polish, but close enough. Access Now urges reading their full narrative post and Lookout’s breakdown. Do it. Details matter.

My unique angle? This isn’t just tech terror; it’s business model evolution. Post-Edward Snowden, big spyware firms got sanctioned—NSO blacklisted. Enter the bazaar: fragmented, resilient. Hackers-for-hire scale via Telegram channels, crypto payments. Egypt’s not unique—think Russia targeting dissidents, Iran hitting exiles. Who profits? The middlemen, always.

Four sentences here, varied. But the real scandal? Platforms like Google, Apple—still playing whack-a-mole with phishing kits sold openly.

Extended thought: We’ve poured billions into AI defenses, yet basic social engineering owns the day. Valley’s hyping quantum crypto while Manila hackers laugh. Repression 2.0: outsourced, untraceable, relentless.

Lessons for Journalists Everywhere

Don’t click dumbly. Use hardware keys—sorry, not sexy. Train on red flags: odd URLs, pressure tactics. But honestly? Systemic fix needed. Governments must crush these markets, not wink at ‘em.

Access Now’s helpline? Lifeline for targets. They’ve helped dozens. Yet funding’s tight; Big Tech donates PR, not enough.

Punchy: Wake up.

Dense wrap: Reports like this pierce the veil, but without arrests—say, busting an Indian call center op like the 2021 one—it’s whack-a-mole forever. Egypt’s critics fight on; we owe better vigilance.


🧬 Related Insights

Frequently Asked Questions

What is a hack-for-hire campaign?

Mercenaries-for-cyber: hired guns breaching targets for clients, often regimes, via phishing or exploits. Cash via crypto, no questions.

How do spear-phishing attacks target journalists?

Fake emails from ‘colleagues’ or services trick logins, data dumps. Builds on real intel for credibility.

Can governments be held accountable for hack-for-hire?

Tough—deniability reigns. Sanctions hit tools, not always users. Push for global norms.

Priya Sundaram
Written by

Hardware and infrastructure reporter. Tracks GPU wars, chip design, and the compute economy.

Frequently asked questions

What is a hack-for-hire campaign?
Mercenaries-for-cyber: hired guns breaching targets for clients, often regimes, via phishing or exploits. Cash via crypto, no questions.
How do spear-phishing attacks target journalists?
Fake emails from 'colleagues' or services trick logins, data dumps. Builds on real intel for credibility.
Can governments be held accountable for hack-for-hire?
Tough—deniability reigns. Sanctions hit tools, not always users. Push for global norms.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Access Now

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.