A mysterious hacker has for years been tricking Libyan citizens into infecting themselves with mobile and desktop malware by luring them to weaponized Facebook pages that impersonate key local figures and purport to deliver news of interest to the civil war-torn nation's people.
Researchers from Check Point Software Technologies have traced the campaign – dubbed Operation Tripoli – to an apparent Arabic-speaking actor of Libyan origin who goes by the alias "Dexter Ly." A review of the actor's very own Facebook account revealed screenshots of control panels used to manage victims, as well as sensitive information stolen from them, including secret documents from Libya's government, and emails, phone numbers and passport images of local officials.
In a research report today, Check Point says Facebook removed the offending pages and accounts after learning of the operation from the cybersecurity company. "Some of the pages impersonate important Libyan figures and leaders, others are supportive of certain political campaigns or military operations in the country, and the majority are news pages from cities such as Tripoli or Benghazi," the report states. "In total, there are more than 40 unique malicious links used by the attacker over the years, which were shared in those pages."
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.