{"id":3110564,"date":"2026-04-08T11:51:20","date_gmt":"2026-04-08T18:51:20","guid":{"rendered":"https:\/\/techcrunch.com\/?p=3110564"},"modified":"2026-04-08T12:31:35","modified_gmt":"2026-04-08T19:31:35","slug":"hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups","status":"publish","type":"post","link":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","title":{"rendered":"Hack-for-hire group caught targeting Android devices and iCloud backups"},"content":{"rendered":"\n<p id=\"speakable-summary\" class=\"wp-block-paragraph\">Security researchers say they have identified a hack-for-hire group targeting journalists, activists, and government officials across the Middle East and North Africa. The hackers used phishing attacks to access targets\u2019 iCloud backups and messaging accounts on Signal, and deployed Android spyware capable of taking over the targets\u2019 devices.<\/p>\n\n<p class=\"wp-block-paragraph\">This hacking campaign highlights a growing trend of government agencies outsourcing their hacking operations to private hack-for-hire companies. Some governments already rely on commercial companies that develop spyware and exploits used by police and intelligence agencies to access data on people&#8217;s phones.<\/p>\n\n<p class=\"wp-block-paragraph\">Researchers from the digital rights organization Access Now documented <a href=\"https:\/\/www.accessnow.org\/wp-content\/uploads\/2026\/04\/Espionage-for-repression-forensic-analysis-of-a-cross-border-hack-for-hire-campaign-targeting-civil-society-in-MENA-2026.pdf\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">three instances of attacks<\/a> over 2023 through 2025 against two Egyptian journalists, and a journalist in Lebanon whose case was also <a href=\"https:\/\/smex.org\/smex-may2025\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">documented<\/a> by digital rights organization SMEX.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">Mobile cybersecurity company Lookout <a href=\"https:\/\/www.lookout.com\/threat-intelligence\/article\/bitter-hack-for-hire\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">also investigated these attacks<\/a>. The three organizations collaborated with each other and published separate reports on Wednesday.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">According to Lookout, the attacks go beyond members of Egyptian and Lebanese civil society, and include targets in the Bahraini and Egyptian governments, as well as targets in the United Arab Emirates, Saudi Arabia, the United Kingdom, and potentially the United States or alumni of American universities.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">Lookout concluded that the hackers behind this espionage campaign work for a hack-for-hire vendor with connections to BITTER APT, a hacking group that <a href=\"http:\/\/proofpoint.com\/us\/blog\/threat-insight\/bitter-end-unraveling-eight-years-espionage-antics-part-one\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">cybersecurity<\/a> <a href=\"https:\/\/www.threatray.com\/blog\/the-bitter-end-unraveling-eight-years-of-espionage-antics-part-two\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">companies<\/a> suspect has ties to the Indian government.<\/p>\n\n<p class=\"wp-block-paragraph\">Justin Albrecht, principal researcher at Lookout, told TechCrunch that the company behind the campaign may be an offshoot of the Indian hack-for-hire startup Appin, and noted one such company named <a rel=\"nofollow\" href=\"https:\/\/www.surveillancewatch.io\/entities\/rebsec-solutions\">RebSec<\/a> as a possible suspect. In 2022 and 2023, Reuters published <a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-hackers-litigation\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">extensive<\/a> <a href=\"https:\/\/www.reuters.com\/investigates\/special-report\/usa-hackers-appin\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">investigations<\/a> into Appin and other similar India-based companies, which exposed how these companies are allegedly hired to hack company executives, politicians, military officials, and others.\u00a0<\/p>\n<div class=\"wp-block-techcrunch-inline-cta\">\n\t<div class=\"inline-cta__wrapper\">\n\t\t<div class=\"inline-cta__logo\">\n\t\t\t<svg aria-hidden=\"true\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"41\" height=\"20\" fill=\"none\" viewBox=\"0 0 41 20\"><path fill=\"#fff\" d=\"M0 0v6.452h7.097V20h7.097V6.452h6.451V0zM27.742 13.548V6.452h-7.097V20h20v-6.452zM40.645 0H27.742v6.452h12.903z\"\/><\/svg>\t\t<\/div>\n\t\t<div class=\"inline-cta__flag\">Techcrunch event<\/div>\n\t\t<div class=\"inline-cta__content\">\n\t\t\t<div class=\"inline-cta__header-container\">\n\t\t\t\t<div class=\"inline-cta__header-container-desktop\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"inline-cta__header has-h-5-font-size\">Meet your next investor or portfolio startup at Disrupt<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"inline-cta__subheader\"><br>Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.<\/h4>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"inline-cta__header-container-mobile\">\n\t\t\t\t\t\t\t\t\t\t\t<h3 class=\"inline-cta__header has-h-5-font-size\">Meet your next investor or portfolio startup at Disrupt<\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<h4 class=\"inline-cta__subheader\"><br>Your next round. Your next hire. Your next breakout opportunity. Find it at TechCrunch Disrupt 2026, where 10,000+ founders, investors, and tech leaders gather for three days of 250+ tactical sessions, powerful introductions, and market-defining innovation. Register now to save up to $410.<\/h4>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<div class=\"inline-cta__event-info\">\n\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__location\">San Francisco, CA<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__separator\">|<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"inline-cta__date\">October 13-15, 2026<\/span>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"inline-cta__register-button\">\n\t\t\t\t\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a data-ctaText=\"REGISTER NOW\" data-destinationLink=\"https:\/\/techcrunch.com\/events\/tc-disrupt-2026\/?utm_source=tc&amp;utm_medium=ad&amp;utm_campaign=disrupt2026&amp;utm_content=tc_inline_eb&amp;promo=tc_inline_eb&amp;display=\" data-event=\"button\" class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/techcrunch.com\/events\/tc-disrupt-2026\/?utm_source=tc&amp;utm_medium=ad&amp;utm_campaign=disrupt2026&amp;utm_content=tc_inline_eb&amp;promo=tc_inline_eb&amp;display=\" target=\"_blank\" rel=\"noreferrer noopener\">REGISTER NOW<\/a><\/div>\n<\/div>\n\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<p class=\"wp-block-paragraph\">Appin apparently later shut down, but Albrecht noted that the discovery of this new hacking campaign shows that the activity &#8220;didn\u2019t disappear and they just moved onto smaller companies.\u201d&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">These groups and their customers get \u201cplausible deniability since they run all the operations and infrastructure.\u201d And for their customers, these hack-for-hire groups are likely cheaper than purchasing <a href=\"https:\/\/techcrunch.com\/2025\/04\/25\/techcrunch-reference-guide-to-security-terminology\/#spyware-commercial-government\">commercial spyware<\/a>, said Albrecht.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">Rebsec could not be reached for comment, as the company has deleted its social media accounts and website.&nbsp;<\/p>\n<p class=\"wp-block-shortcode\">\t\t<div class=\"article-block block--callout block--right has-green-500-background-color\" >\n\t\t\t<h4 class=\"block--callout__title\">Contact Us<\/h4>\n\t\t\tDo you have more information about Rebsec Solutions? Or other hack-for-hire companies? From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Telegram and Keybase @lorenzofb, or <a href=\"mailto:lorenzo@techcrunch.com\/\">email<\/a><a href=\"mailto:lorenzo@techcrunch.com\/\">.<\/a>\t\t<\/div>\n\t\t<\/p>\n\n<p class=\"wp-block-paragraph\">\u2068Mohammed Al-Maskati\u2069, an investigator and director at Access Now\u2019s <a href=\"https:\/\/techcrunch.com\/2025\/12\/27\/meet-the-team-that-investigates-when-journalists-and-activists-get-hacked-with-government-spyware\/\">Digital Security Helpline<\/a> who worked on these cases, said that \u201cthese operations have become cheaper and it\u2019s possible to evade responsibility, especially since we won\u2019t know who the end customer is, and the infrastructure won\u2019t reveal the entity behind it.\u201d<\/p>\n\n<p class=\"wp-block-paragraph\">While groups like BITTER may not have the most advanced hacking and spy tools, their tactics can still be highly effective.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">In the attacks part of this campaign, the hackers used several different techniques. When targeting iPhone users, the hackers tried to trick targets into giving up their Apple ID credentials in order to then hack into their iCloud backups, which effectively would have given them access to the full content of the targets\u2019 iPhones.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">This is \u201cpotentially a cheaper alternative to the use of more sophisticated and expensive iOS spyware,\u201d according to Access Now.<\/p>\n\n<p class=\"wp-block-paragraph\">When targeting Android users, the hackers used a spyware called ProSpy, masquerading as popular messaging and communications apps like Signal, WhatsApp, and Zoom, as well as ToTok and Botim, two apps that are popular in the Middle East.&nbsp;<\/p>\n\n<p class=\"wp-block-paragraph\">In some cases, the hackers tried to trick victims into registering and adding a new device \u2014 controlled by the hackers \u2014 to their Signal account, a technique that has been popular among various hacking groups, <a href=\"https:\/\/techcrunch.com\/2026\/03\/09\/russian-government-hackers-targeting-signal-and-whatsapp-users-dutch-spies-warn\/\">including Russian spies<\/a>.<\/p>\n\n<p class=\"wp-block-paragraph\">A spokesperson for the Indian embassy in Washington, D.C. did not immediately respond to a request for comment.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.<\/p>\n","protected":false},"author":133574594,"featured_media":2208700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"tc-featured-article":false,"tc-header-option":"","tc-breaking-news":false,"tc-article-brief":false,"carmot_uuid":"","apple_news_api_created_at":"2026-04-08T18:51:27Z","apple_news_api_id":"03673e71-029f-4a36-a350-dfb698e13248","apple_news_api_modified_at":"2026-04-08T19:31:34Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAABg==","apple_news_api_share_url":"https:\/\/apple.news\/AA2c-cQKfSjajUN-2mOEySA","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":[],"apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"tc_subtitle":"","tc_featured_image_disabled":false,"tc_exclude_from_rss_feed":false,"tc_exclude_from_content_rivers":false,"footnotes":""},"categories":[21587494],"tags":[641922,61188,106595,1816,278936,449557107,5448,577319918,577370126],"tc_region":[577037498],"tc_event":[],"tc_storyline_tax":[],"coauthors":[577104450],"class_list":["post-3110564","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-android","tag-hackers","tag-iphone","tag-hacking","tag-lookout","tag-middle-east","tag-spyware","tag-cyberespionage","tag-accessnow","tc_region-india"],"apple_news_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.1 (Yoast SEO v25.1) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch<\/title>\n<meta name=\"description\" content=\"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch\" \/>\n<meta property=\"og:description\" content=\"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\" \/>\n<meta property=\"og:site_name\" content=\"TechCrunch\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/techcrunch\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-08T18:51:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-08T19:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg?resize=1200,751\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"751\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:site\" content=\"@TechCrunch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lorenzo Franceschi-Bicchierai\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\"},\"author\":{\"name\":\"Lorenzo Franceschi-Bicchierai\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\"},\"headline\":\"Hack-for-hire group caught targeting Android devices and iCloud backups\",\"datePublished\":\"2026-04-08T18:51:20+00:00\",\"dateModified\":\"2026-04-08T19:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg\",\"keywords\":[\"Android\",\"hackers\",\"iPhone\",\"hacking\",\"Lookout\",\"Middle East\",\"Spyware\",\"cyberespionage\",\"AccessNow\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2026\",\"copyrightHolder\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\",\"url\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\",\"name\":\"Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch\",\"isPartOf\":{\"@id\":\"https:\/\/techcrunch.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg\",\"datePublished\":\"2026-04-08T18:51:20+00:00\",\"dateModified\":\"2026-04-08T19:31:35+00:00\",\"description\":\"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg\",\"width\":2876,\"height\":1800,\"caption\":\"spyware illustrated; blank smartphone screen over a pink background of multiple eyes\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/techcrunch.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hack-for-hire group caught targeting Android devices and iCloud backups\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/techcrunch.com\/#website\",\"url\":\"https:\/\/techcrunch.com\/\",\"name\":\"TechCrunch\",\"description\":\"Startup and Technology News\",\"publisher\":{\"@id\":\"https:\/\/techcrunch.com\/#organization\"},\"alternateName\":\"TC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/techcrunch.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/techcrunch.com\/#organization\",\"name\":\"TechCrunch\",\"alternateName\":\"TC\",\"url\":\"https:\/\/techcrunch.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"contentUrl\":\"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200\",\"width\":1200,\"height\":1200,\"caption\":\"TechCrunch\"},\"image\":{\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/techcrunch\",\"https:\/\/x.com\/TechCrunch\",\"https:\/\/mstdn.social\/@TechCrunch\",\"https:\/\/bsky.app\/profile\/techcrunch.com\",\"https:\/\/www.threads.net\/@techcrunch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029\",\"name\":\"Lorenzo Franceschi-Bicchierai\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g\",\"caption\":\"Lorenzo Franceschi-Bicchierai\"},\"url\":\"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch","description":"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","og_locale":"en_US","og_type":"article","og_title":"Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch","og_description":"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.","og_url":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","og_site_name":"TechCrunch","article_publisher":"https:\/\/www.facebook.com\/techcrunch","article_published_time":"2026-04-08T18:51:20+00:00","article_modified_time":"2026-04-08T19:31:35+00:00","og_image":[{"width":1200,"height":751,"url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg?resize=1200,751","type":"image\/jpeg"}],"author":"Lorenzo Franceschi-Bicchierai","twitter_card":"summary_large_image","twitter_creator":"@TechCrunch","twitter_site":"@TechCrunch","twitter_misc":{"Written by":"Lorenzo Franceschi-Bicchierai","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#article","isPartOf":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/"},"author":{"name":"Lorenzo Franceschi-Bicchierai","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029"},"headline":"Hack-for-hire group caught targeting Android devices and iCloud backups","datePublished":"2026-04-08T18:51:20+00:00","dateModified":"2026-04-08T19:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/"},"wordCount":672,"publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg","keywords":["Android","hackers","iPhone","hacking","Lookout","Middle East","Spyware","cyberespionage","AccessNow"],"articleSection":["Security"],"inLanguage":"en-US","copyrightYear":"2026","copyrightHolder":{"@id":"https:\/\/techcrunch.com\/#organization"}},{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","url":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","name":"Hack-for-hire group caught targeting Android devices and iCloud backups | TechCrunch","isPartOf":{"@id":"https:\/\/techcrunch.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage"},"image":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg","datePublished":"2026-04-08T18:51:20+00:00","dateModified":"2026-04-08T19:31:35+00:00","description":"Security researchers exposed a spying campaign by a hack-for-hire group that used Android spyware and phishing to steal iCloud credentials and hack victims\u2019 devices.","breadcrumb":{"@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#primaryimage","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg","width":2876,"height":1800,"caption":"spyware illustrated; blank smartphone screen over a pink background of multiple eyes"},{"@type":"BreadcrumbList","@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/techcrunch.com\/"},{"@type":"ListItem","position":2,"name":"Hack-for-hire group caught targeting Android devices and iCloud backups"}]},{"@type":"WebSite","@id":"https:\/\/techcrunch.com\/#website","url":"https:\/\/techcrunch.com\/","name":"TechCrunch","description":"Startup and Technology News","publisher":{"@id":"https:\/\/techcrunch.com\/#organization"},"alternateName":"TC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/techcrunch.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/techcrunch.com\/#organization","name":"TechCrunch","alternateName":"TC","url":"https:\/\/techcrunch.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","contentUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2018\/04\/tc-logo-2018-square-reverse2x.png?resize=1200,1200","width":1200,"height":1200,"caption":"TechCrunch"},"image":{"@id":"https:\/\/techcrunch.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/techcrunch","https:\/\/x.com\/TechCrunch","https:\/\/mstdn.social\/@TechCrunch","https:\/\/bsky.app\/profile\/techcrunch.com","https:\/\/www.threads.net\/@techcrunch"]},{"@type":"Person","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/ae6736172fc69d49ba9b3d836e93d029","name":"Lorenzo Franceschi-Bicchierai","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/techcrunch.com\/#\/schema\/person\/image\/e5c2a45b56c8d08b18a46cf3571af0fc","url":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/675be9c00f9239b767b25cc470ba3878e035e319722e04170747562fd77e0d42?s=96&d=identicon&r=g","caption":"Lorenzo Franceschi-Bicchierai"},"url":"https:\/\/techcrunch.com\/author\/lorenzo-franceschi-bicchierai\/"}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Hack-for-hire group caught targeting Android devices and iCloud backups","url":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/","mainEntityOfPage":{"@type":"WebPage","@id":"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/"},"thumbnailUrl":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg?w=150","image":{"@type":"ImageObject","url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg"},"articleSection":"Security","author":[{"@type":"Person","name":"Lorenzo Franceschi-Bicchierai"}],"creator":["Lorenzo Franceschi-Bicchierai"],"publisher":{"@type":"Organization","name":"TechCrunch","logo":"https:\/\/techcrunch.com\/wp-content\/uploads\/2015\/02\/cropped-cropped-favicon-gradient.png"},"keywords":["android","hackers","iphone","hacking","lookout","middle east","spyware","cyberespionage","accessnow"],"dateCreated":"2026-04-08T18:51:20Z","datePublished":"2026-04-08T18:51:20Z","dateModified":"2026-04-08T19:31:35Z"},"rendered":"<meta name=\"parsely-title\" content=\"Hack-for-hire group caught targeting Android devices and iCloud backups\" \/>\n<meta name=\"parsely-link\" content=\"https:\/\/techcrunch.com\/2026\/04\/08\/hack-for-hire-group-caught-targeting-android-devices-and-icloud-backups\/\" \/>\n<meta name=\"parsely-type\" content=\"post\" \/>\n<meta name=\"parsely-image-url\" content=\"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg?w=150\" \/>\n<meta name=\"parsely-pub-date\" content=\"2026-04-08T18:51:20Z\" \/>\n<meta name=\"parsely-section\" content=\"Security\" \/>\n<meta name=\"parsely-tags\" content=\"android,hackers,iphone,hacking,lookout,middle east,spyware,cyberespionage,accessnow\" \/>\n<meta name=\"parsely-author\" content=\"Lorenzo Franceschi-Bicchierai\" \/>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/techcrunch.com\/p.js"},"jetpack_featured_media_url":"https:\/\/techcrunch.com\/wp-content\/uploads\/2021\/09\/android-spyware-malloc.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3110564","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/users\/133574594"}],"replies":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/comments?post=3110564"}],"version-history":[{"count":11,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3110564\/revisions"}],"predecessor-version":[{"id":3110624,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/posts\/3110564\/revisions\/3110624"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media\/2208700"}],"wp:attachment":[{"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/media?parent=3110564"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/categories?post=3110564"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tags?post=3110564"},{"taxonomy":"tc_region","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_region?post=3110564"},{"taxonomy":"tc_event","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_event?post=3110564"},{"taxonomy":"tc_storyline_tax","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/tc_storyline_tax?post=3110564"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/techcrunch.com\/wp-json\/wp\/v2\/coauthors?post=3110564"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}