#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

34 C
Dubai
Wednesday, July 2, 2025
HomeAfricaUnder Scrutiny: Hackers Target Human Rights Activists in Morocco and Western Sahara

Under Scrutiny: Hackers Target Human Rights Activists in Morocco and Western Sahara

Date:

Related stories

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...

Cybercriminals Weaponized Open-Source Tools in Sustained Campaign Against Africa’s Financial Sector

Since mid-2023, a cybercriminal cluster dubbed CL‑CRI‑1014 has been...

Critical TeamViewer Remote Management Flaw Allows SYSTEM‑Level File Deletion

A high‑severity vulnerability, CVE‑2025‑36537, has been identified in TeamViewer...
spot_imgspot_imgspot_imgspot_img

Human rights activists play a vital role in holding governments accountable and advocating for justice. However, their dedication to positive change often places them in the crosshairs of those who seek to silence dissent.

Recent reports indicate that human rights activists in Morocco and the disputed Western Sahara region are being targeted by hackers in a concerning escalation of digital threats. Let’s delve into the details of these attacks, explore the potential consequences, and provide crucial cybersecurity advice to protect activists on the front lines.

Digital Espionage: Starry Addax Targets Activists

Cisco Talos, a cybersecurity threat intelligence group, has identified a new threat actor dubbed “Starry Addax” targeting human rights activists associated with the Sahrawi Arab Democratic Republic (SADR) in Morocco and Western Sahara. Starry Addax utilizes a combination of phishing emails and fake websites designed to compromise activist devices and steal sensitive information.

Phishing for Information: Deceptive Tactics Employed

Starry Addax’s phishing emails typically masquerade as legitimate communications from trusted sources, such as the Sahara Press Service, a news agency aligned with the SADR. These emails entice recipients to click on malicious links that download fake mobile apps or redirect them to bogus login pages designed to steal usernames, passwords, and other sensitive data.

Beyond Stolen Logins: Potential Impact of the Attacks

A successful attack by Starry Addax could have severe consequences for human rights activists, including:

  • Exposure of Sensitive Information: Compromised credentials could grant attackers access to confidential communications, reports, and other sensitive data related to human rights activities.
  • Disruption of Operations: Malware infections or data breaches could disrupt communication channels and hinder the ability of activists to carry out their work.
  • Physical Safety Concerns: Stolen information could be used to identify and target activists for offline harassment or intimidation.

10 Cybersecurity Best Practices for Human Rights Activists

Here are 10 essential cybersecurity practices human rights activists can adopt to minimize their risk:

  1. Be Wary of Phishing Emails: Scrutinize email addresses and sender names carefully for inconsistencies. Don’t click on suspicious links or attachments.
  2. Strong Passwords and MFA: Utilize strong, unique passwords for all online accounts and enable Multi-Factor Authentication (MFA) wherever possible.
  3. Verify App Downloads: Only download applications from trusted sources like official app stores.
  4. Beware of Fake Login Pages: Double-check website URLs before entering login credentials. Look for the padlock symbol and HTTPS encryption in the address bar.
  5. Use a Password Manager: Consider using a password manager to generate and store strong passwords for different accounts.
  6. Update Software Regularly: Promptly install security updates for your operating systems, applications, and web browsers.
  7. Encrypt Sensitive Data: Encrypt sensitive data on your devices and cloud storage to render it unusable in case of a breach.
  8. Use a VPN for Sensitive Activities: Consider using a Virtual Private Network (VPN) when connecting to public Wi-Fi networks.
  9. Be Aware of Your Surroundings: Maintain physical security of your devices and avoid using them in public places where someone might observe your screen.
  10. Security Awareness Training: Invest in security awareness training to learn about the latest cyber threats and best practices to stay safe online.

Conclusion

The targeting of human rights activists in Morocco and Western Sahara highlights the growing challenges faced by those advocating for social change in the digital age. By adopting robust cybersecurity measures and remaining vigilant, human rights activists can significantly decrease their risk of falling victim to cyberattacks and continue their vital work. Remember, cybersecurity is an ongoing process, and staying informed about evolving threats is crucial for staying a step ahead of malicious actors.

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here