As many as 25 web sites linked to the Kurdish minority have been compromised as a part of a watering gap assault designed to reap delicate info for over a 12 months and a half.
French cybersecurity agency Sekoia, which disclosed particulars of the marketing campaign dubbed SilentSelfie, described the intrusion set as long-running, with first indicators of an infection detected way back to December 2022.
The strategic net compromises are designed to ship 4 totally different variants of an information-stealing framework, it added.
“These ranged from the best, which merely stole the consumer’s location, to extra complicated ones that recorded pictures from the selfie digital camera and led chosen customers to put in a malicious APK, i.e an utility used on Android,” safety researchers Felix Aimé and Maxime A mentioned in a Wednesday report.
Focused web sites embody Kurdish press and media, Rojava administration and its armed forces, these associated to revolutionary far-left political events and organizations in Türkiye and Kurdish areas. Sekoia instructed The Hacker Information that the precise technique by which these web sites had been breached within the first place stays unsure.
The assaults haven’t been attributed to any identified risk actor or entity, indicating the emergence of a brand new risk cluster focusing on the Kurdish neighborhood, which has been beforehand singled out by teams like StrongPity and BladeHawk.
Earlier this 12 months, Dutch safety agency Hunt & Hackett additionally revealed that Kurdish web sites within the Netherlands had been singled out by a Türkiye-nexus risk actor often known as Sea Turtle.
The watering gap assaults are characterised by the deployment of a malicious JavaScript that is answerable for gathering numerous varieties of data from web site guests, together with their location, gadget information (e.g., variety of CPUs, battery standing, browser language, and so on.), and public IP handle, amongst others.
One variant of the reconnaissance script discovered on three web sites (rojnews[.]information, hawarnews[.]com, and targetplatform[.]internet.) has additionally been noticed redirecting customers to rogue Android APK information, whereas some others embody the flexibility for consumer monitoring through a cookie named “sessionIdVal.”
The Android app, per Sekoia’s evaluation, embeds the web site itself as a WebView, whereas additionally clandestinely hoovering system info, contact lists, location, and information current within the exterior storage based mostly on the permissions granted to it.
“It’s value noting that this malicious code would not have any persistence mechanism however is barely executed when the consumer opens the RojNews utility,” the researchers identified.

“As soon as the consumer opens the appliance, and after 10 seconds, the LocationHelper service begins beaconning the background to the URL rojnews[.]information/wp-includes/sitemaps/ through HTTP POST requests, sharing the present location of the consumer and ready for instructions to execute.”
Not a lot is understood about who’s behind SilentSelfie, however Sekoia has assessed that it may very well be the handiwork of the Kurdistan Regional Authorities of Iraq based mostly on the arrest of RojNews journalist Silêman Ehmed by KDP forces in October 2023. He was sentenced to 3 years in jail in July 2024.
“Though this watering gap marketing campaign is of low sophistication, it’s notable for the variety of kurdish web sites affected and its length,” the researchers mentioned. “The marketing campaign’s low stage of sophistication suggests it is perhaps the work of an uncovered risk actor with restricted capabilities and comparatively new to the sphere.”