Blog
New Phishing Technique Targets Android and iPhone Users

In the ever-evolving landscape of cybersecurity threats, a newly discovered phishing method has been found that specifically targets users of Android and iPhone devices. This sophisticated attack underscores the increasing ingenuity of cybercriminals, who continuously adapt to bypass traditional security measures. The discovery of this method highlights the necessity for heightened vigilance among mobile device users.
The Evolution of Phishing Attacks
Phishing attacks have significantly evolved since their inception, adapting to new technologies and user behaviors. Initially, phishing was mostly conducted via email, where attackers would send mass messages hoping to trick users into providing sensitive information. Over time, phishing techniques have diversified, incorporating social engineering tactics and targeting specific individuals or groups.
The rise of smartphones introduced mobile phishing, where SMS, social media, and mobile apps became common attack vectors. Today, phishing schemes are more sophisticated, often using fake websites, deceptive apps, and even exploiting emerging technologies like cloud services and IoT devices.
Key Phishing Attack Evolutions:
- Email to Multi-Channel Attacks: Initially email-focused, phishing now spans SMS, social media, and even phone calls.
- Mass Attacks to Spear Phishing: Attackers shifted from mass emails to targeted attacks, often impersonating trusted contacts.
- Static to Dynamic: Modern phishing attacks often use dynamic, real-time tactics, such as man-in-the-middle attacks.
- Simple Scams to Advanced Threats: Early phishing scams were rudimentary, but today’s attacks involve sophisticated methods like clone phishing and fake websites with legitimate-looking SSL certificates.
- Emergence of Phishing-as-a-Service (PhaaS): Organized cybercriminal groups now offer phishing kits and services, lowering the barrier for less skilled attackers to launch sophisticated attacks.
How to Combat Phishing:
Continuous Monitoring: Use AI-driven tools to detect and respond to phishing attacks in real-time.
User Education: Regular training and awareness programs to help users recognize phishing attempts.
Advanced Security Measures: Implement multi-factor authentication, email filtering, and secure browsing practices.
How the New Phishing Method Works
Deceptive Communication: The user receives a phishing message, often via email, SMS, or social media, which appears to be from a legitimate source.
Malicious Link or App: The message contains a link or prompts the user to download a malicious app. The link may lead to a fake website that closely resembles a legitimate one, asking for sensitive information like login credentials.
Exploitation of Trust: The phishing site or app requests permissions or information under the guise of being a legitimate service.
Data Exfiltration: Once the user inputs their information or grants permissions, the attacker gains access to sensitive data such as passwords, financial details, or personal communications.
Device Compromise: In some cases, the malicious app may further compromise the device, enabling attackers to steal more data or install additional malware.
The Impact on Android and iPhone Users
The cross-platform aspect of this phishing method makes it a serious threat. Users from both Android and iOS ecosystems are equally at risk, and the methods used are designed to exploit the unique features of each operating system. For instance, the phishing attack might mimic the interface of legitimate apps or websites to appear credible, making it harder for users to discern the scam.
The consequences of falling victim to such an attack can be severe. Compromised devices can lead to unauthorized access to personal and financial information, enabling identity theft, financial fraud, and even broader security breaches if the compromised device is used for business purposes.
Protecting Yourself from Phishing Attacks
To protect against this and other phishing attacks, users should adopt the following best practices:
- Be Cautious with Links: Avoid clicking on suspicious links, especially those received via email or SMS from unknown sources. Even if the message seems legitimate, it’s safer to navigate to the website or app directly through known channels.
- Verify App Updates and Downloads: Only update apps through official channels like the Google Play Store or Apple App Store. Be cautious about installing apps from unknown sources or following prompts to download software from unfamiliar websites.
- Enable Two-Factor Authentication (2FA): Strengthen your account security by enabling 2FA wherever possible. This adds an extra layer of protection, requiring both your password and a second form of verification to access your account.
- Install Security Software: Use reputable mobile security apps to detect and block phishing attempts. These apps can provide real-time protection and alert you to potential threats before they cause harm.
- The Role of Social Engineering in Phishing
- Social engineering plays a critical role in these phishing attacks. Cybercriminals craft messages that exploit human psychology, such as urgency, fear, or curiosity, to prompt immediate action. For example, a phishing message might warn of an urgent security issue requiring an immediate update, leading the user to a fake site or app.
- Mobile-Specific Vulnerabilities
- Mobile devices are uniquely vulnerable to phishing due to their small screen size and the way information is displayed. Links might not show the full URL, making it harder to detect suspicious sites. Additionally, mobile operating systems often encourage seamless integration with apps and services, which can be exploited by malicious actors to trick users into granting permissions.
- Case Studies of Recent Phishing Attacks
- Recent cases have shown that even well-known companies and platforms are not immune. For instance, users of popular financial apps have been targeted by phishing schemes that mimic legitimate notifications. These fake notifications prompt users to log in to a spoofed version of the app, resulting in the theft of their credentials.
- The Future of Mobile Phishing Attacks
- As mobile technology advances, phishing techniques are expected to become even more sophisticated. With the increasing use of biometric authentication and mobile payments, attackers might attempt to compromise these systems. Understanding the evolving threat landscape is crucial for developing effective countermeasures.
- Education and Awareness as Key Defenses
- Educating users about the signs of phishing and the importance of skepticism is one of the most effective defenses. Organizations can implement training programs that simulate phishing attacks, helping employees recognize and avoid real threats. Moreover, continuous updates on new phishing tactics can keep users informed and cautious.
- Legal and Regulatory Measures
- There is also a growing need for legal and regulatory frameworks to address phishing, especially in the mobile domain. Governments and international bodies are beginning to recognize the importance of combating cybercrime, leading to stricter laws and regulations. These measures can help deter criminals and provide recourse for victims.
Blog
Morocco Sets Sights on 70% 5G Coverage by 2030 With New License Launch

RABAT — July 26, 2025
In a landmark step toward digital transformation, Morocco’s National Telecommunications Regulatory Agency (ANRT) has officially launched the bidding process for 5G licenses, inviting national and international telecom operators to help deliver 25% population coverage by 2026 and 70% by 2030.
5G Strategy to Power FIFA World Cup and Beyond
The initiative aligns with Morocco’s preparations to co-host the 2030 FIFA World Cup and its broader Maroc Digital 2030 agenda. “This is about more than faster networks—it’s about our national future,” said Driss El Yazami, policy advisor at the Ministry of Digital Transition.
Highlights of the 5G Deployment Plan
- Initial rollouts in Casablanca, Rabat, Marrakech, and Tangier
- Smart infrastructure integration in stadiums and airports
- Spectrum allocation in 3.5GHz and mmWave bands
- Coverage expansion to underserved rural regions
From Urban Startups to Rural Farmers: 5G’s National Reach
5G is expected to revolutionize Moroccan society. Students will gain access to virtual classrooms, remote clinics will offer telemedicine, and farmers can deploy smart sensors. “Connectivity is empowerment,” said Amina El Mahdi, a tech entrepreneur in Fez.
Economic Impact and Cybersecurity Measures
The Ministry of Finance predicts 5G will boost GDP by 1.5% by 2030. All operators must meet strict cybersecurity, data localization, and interoperability standards monitored by ANRT and the National Cybersecurity Directorate.
2030 World Cup: Smart Stadiums and Global Broadcasts
With over 1.5 million visitors expected, 5G will support crowd management, mobile ticketing, HD broadcasts, and fan engagement zones across Moroccan host cities.
5G infrastructure being deployed in Morocco’s major cities ahead of FIFA 2030.
Blog
Critical Cyber Breach in Tunisia: Government Systems and Banks Hacked, Confidential Data for Sale

A coordinated cyberattack led by Moroccan hacker Jokeir 07x and groups Dark Hell 07x and Dr. Shell 08x compromises key Tunisian institutions, exposing government systems, banking infrastructure, and personal data to global exploitation.
Tunis, July 2025 — In an alarming escalation of cyber threats across North Africa, Tunisia has become the latest victim of a highly organized and devastating cyberattack. Orchestrated by Moroccan threat actor Jokeir 07x, in partnership with the groups Dark Hell 07x and Dr. Shell 08x, the operation has compromised critical national infrastructure—from government domains to private financial institutions.
“This is not just a defacement campaign—it’s full infrastructure penetration,” declared Jokeir 07x on Telegram.
The targets include the Ministry of Finance, Bank of Tunisia, BTK, and the Tunisian Academy of Banking and Finance, among others. The attackers claim full access to internal systems, including emails, financial records, developer platforms, and sensitive citizen data.
🏛️ Government Domain Breached: Ministry of Finance
The domain finances.gov.tn
was infiltrated through 16 high-risk subdomains such as auth.
, gitlab.intra.
, mail.
, and login-tej.
According to hacker statements, these allowed access to:
- Internal recruitment systems
- Budgetary information
- Developer repositories
- Administrative emails
This level of penetration indicates control over Tunisia’s digital authentication infrastructure and DevOps environment, raising severe concerns for national cybersecurity.
🏦 Banking Sector Compromised and Data Sold
Several banks were also impacted:
- Bank of Tunisia (bt.com.tn):
- Full customer database allegedly available for $4,000
- Individual bank accounts offered at $100
- 5-account bundles sold for $450
- BTK Bank (btknet.com) and Academy of Banking and Finance (abf.tn) also suffered complete breaches, including control over the sites and underlying systems.
The incident signals not just a data breach but the active commercialization of sensitive financial information on the dark web.
🔍 Technical Breakdown: How It Happened
Cybersecurity analysts have pointed to multiple failure points within Tunisia’s digital infrastructure:
- Web Application Vulnerabilities:
- SQL Injection
- File Upload flaws
- XSS
- Remote File Inclusion (RFI)
- SSO and Mail System Exploitation:
- Session hijacking likely
- Weak session/cookie management
- GitLab Exposure:
- Unauthorized access to internal GitLab revealed API tokens, credentials, and system architecture
- Lack of Security Infrastructure:
- No evidence of WAF, IDS, or SIEM defense
- No active monitoring or response systems
- Inadequate Data Protection:
- Absence of encryption, data masking, or tokenization
- Entire banking datasets available in plain text
⚠️ The Fallout: Trust, Security, and Reputation
This attack lays bare the vulnerabilities in Tunisia’s cyber defenses, damaging public trust in both government institutions and the banking sector. The country’s financial and administrative data has now surfaced on international black markets, with potential long-term repercussions for national security and economic stability.
💡 Urgent Recommendations for Recovery and Reform
Cybersecurity professionals are urging Tunisia to immediately:
- Establish internal SOC (Security Operations Centers)
- Mandate routine penetration testing
- Enforce multi-factor authentication (MFA)
- Implement end-to-end data encryption
- Audit and secure GitLab instances
- Conduct staff training on social engineering threats
- Deploy real-time code and data monitoring
“Being hacked is not the shame—failing to learn from it is,” noted a Tunisian cybersecurity analyst. “The future belongs to those who invest in digital resilience, not legacy infrastructure.”
Blog
Cloud Wars 2025: Full Breakdown of Azure, AWS, and Google Cloud Services You Need to Know
As cloud computing reshapes digital infrastructure, this side-by-side comparison of services across Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP) empowers IT professionals and organizations to make informed decisions.
Cloud Wars: Breaking Down the Giants
In today’s digital-first world, cloud computing isn’t just a trend—it’s the backbone of enterprise IT. Whether you’re a startup deploying an app or a global corporation migrating legacy systems, choosing the right cloud provider can make or break your operations. A newly circulated Cloud Services Comparison Cheatsheet provides an invaluable visual breakdown of offerings from Microsoft Azure, Amazon Web Services (AWS), and Google Cloud Platform (GCP), the three dominant players in the cloud arena.
Technical Deep Dive: Key Service Categories Compared
This infographic categorizes over 25 essential cloud services and maps each across Azure, AWS, and GCP equivalents. Here’s what stands out:
1. Compute Services
- Azure: Virtual Machines
- AWS: EC2 (Elastic Compute Cloud)
- Google Cloud: Compute Engine
These services provide scalable virtual server environments, with options for predefined or custom machine types. Azure and AWS offer more mature ecosystems with hybrid cloud integrations, while GCP emphasizes fast boot times and sustained-use discounts.
2. Object Storage
- Azure Blob Storage
- Amazon S3
- Google Cloud Storage
All three services allow you to store large amounts of unstructured data. AWS S3 is known for its advanced features (like S3 Glacier), while Azure Blob integrates well with Microsoft services, and GCP offers multi-regional redundancy by default.
3. Serverless Computing
- Azure Functions
- AWS Lambda
- Google Cloud Functions
Serverless solutions allow developers to execute code without managing servers. AWS Lambda leads in ecosystem maturity, while Azure and Google offer solid integrations with their respective developer tools.
4. Content Delivery Networks (CDNs)
- Azure CDN, AWS CloudFront, and Google Cloud CDN
All three platforms offer global distribution of content to reduce latency. AWS CloudFront is widely adopted in large-scale enterprise environments, while Google leverages its backbone network to deliver high-speed content.
Security & Identity Management
Cloud security remains a priority as data breaches and compliance requirements escalate.
- Identity and Access Management (IAM) is offered across platforms with Azure Active Directory, AWS IAM, and Google Cloud IAM.
- Key Management Services (KMS) ensure secure handling of encryption keys across all three.
- Compliance tools like Azure Trust Center, AWS Cloud HSM, and Google Cloud Security help enterprises adhere to global regulations like GDPR, HIPAA, and ISO/IEC.
Specialized Services: AI, Containers, and Analytics
- Analytics: Azure Stream Analytics, Amazon Kinesis, and Google Dataflow enable real-time data processing.
- Containers: Azure Kubernetes Service (AKS), Amazon EKS, and Google Kubernetes Engine (GKE) support modern container orchestration.
- Automation: Each provider supports automation—Azure with Azure Automation, AWS with OpsWorks, and GCP with Deployment Manager.
Notable Differences
Some categories reveal gaps:
- Google Cloud lacks direct equivalents for services like DNS management (Route 53, Azure DNS) or cloud notifications (AWS SNS, Azure Notification Hub).
- Azure leads in hybrid cloud features due to its integration with Windows Server and on-prem tools.
- AWS offers the broadest service portfolio, making it ideal for complex multi-cloud or global enterprise setups.
-
data breaches7 days ago
ALERT – Stop What You’re Doing & Update WinRAR Now
-
data breaches4 days ago
Hackers Claim Full Network Takeover at Royal Enfield
-
data breaches1 week ago
Leaked Logins Are the New Zero-Days—Here’s How Attackers Exploit Them
-
data breaches6 days ago
From VPN to FortiManager: Attack Pattern Suggests Preparation for New Exploit
-
data breaches4 days ago
Pennsylvania AG’s Website, Email Taken Down in Security Incident
-
International7 days ago
From Rabat to the Sahel: Moroccan Builders Lead Africa’s Largest Road Project
-
International1 week ago
Espionage in the Maghreb: Algerian-Spanish Deal to Counter Morocco Unearthed
-
data breaches4 days ago
New PS1Bot Malware Uses Fileless PowerShell for Data Theft