{"id":523,"date":"2024-04-09T14:48:42","date_gmt":"2024-04-09T14:48:42","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/09\/hackers-targeting-human-rights-activists-in-morocco-and-western-sahara\/"},"modified":"2024-04-09T14:48:42","modified_gmt":"2024-04-09T14:48:42","slug":"hackers-targeting-human-rights-activists-in-morocco-and-western-sahara","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/09\/hackers-targeting-human-rights-activists-in-morocco-and-western-sahara\/","title":{"rendered":"Hackers Targeting Human Rights Activists in Morocco and Western Sahara"},"content":{"rendered":"<p>\u200bHuman rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users.<br \/>\nCisco Talos is\u00a0tracking\u00a0the activity cluster under the name\u00a0Starry Addax, describing it as primarily singling out activists associated with\u00a0Human rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users.<br \/>\nCisco Talos is\u00a0tracking\u00a0the activity cluster under the name\u00a0Starry Addax, describing it as primarily singling out activists associated with\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bHuman rights activists in Morocco and the Western Sahara region are the targets of a new threat actor that leverages phishing attacks to trick victims into installing bogus Android apps and serve credential harvesting pages for Windows users. Cisco Talos is\u00a0tracking\u00a0the activity cluster under the name\u00a0Starry Addax, describing it as primarily singling out activists associated&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/04\/09\/hackers-targeting-human-rights-activists-in-morocco-and-western-sahara\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Hackers Targeting Human Rights Activists in Morocco and Western Sahara<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/523"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=523"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/523\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/524"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}