Facebook and Instagram Used by Advanced Persistent Threats (APTs) to Target South Asia

Recent reports have revealed that three advanced persistent threat (APT) groups have used Facebook and Instagram to target individuals located in South Asia as part of their cyber espionage efforts. These APTs have relied heavily on social engineering tactics to trick people into clicking on malicious links, downloading malware, and sharing personal information over the internet. This article will discuss each of these APTs and their specific tactics in more detail.

Fictitious personas on Facebook and Instagram

The three different threat actors, who leveraged hundreds of elaborate fictitious personas on Facebook and Instagram, are believed to be disparate groups. Each of them relied heavily on social engineering to trick people into clicking on malicious links, downloading malware or sharing personal information across the internet.

One of these groups is a Pakistan-based APT that relied on a network of 120 accounts on Facebook and Instagram, as well as rogue apps and websites, to infect military personnel in India and the Pakistan Air Force with GravityRAT under the guise of cloud storage and entertainment apps. The use of low-sophistication malware with reduced capabilities was noted during this cyber espionage attempt.

Another threat actor that caught Meta’s attention is an India-based APT dubbed Patchwork. This group took advantage of malicious apps uploaded to the Play Store to harvest data from victims in Pakistan, India, Bangladesh, Sri Lanka, Tibet, and China. Meta reported that it purged 50 accounts on Facebook and Instagram linked to this APT.

Disrupting Adversarial Networks

Meta has disrupted six adversarial networks engaged in “coordinated inauthentic behavior” on multiple social media platforms including Twitter, Telegram, YouTube, Medium, TikTok, Blogspot, Reddit, and WordPress. Two of these networks originated from China and operated dozens of fraudulent accounts, pages, and groups across Facebook and Instagram, targeting users in India, Tibet, Taiwan, Japan, and the Uyghur community. Chinese APTs have been notorious for their espionage attempts and are regularly the focus of cybersecurity experts.

The network from Iran singled out Israel, Bahrain, and France, corroborating an earlier assessment from Microsoft about Iran’s involvement in the hacking of the French satirical magazine Charlie Hebdo in January 2023. Redmond has linked 24 Iranian APT operations to the Iranian government in 2022, primarily targeting Israel and the US. Redmond has named these APTs as Moses Staff, Homeland Justice, Abraham’s Ax, Holy Souls, and DarkBit. Seventeen of these operations have taken place since June 2022.

Implications for cybersecurity

The use of social media platforms like Facebook and Instagram, which have a massive user base, could be a significant threat to the cybersecurity of individuals and governments in South Asia and beyond. Furthermore, the prevalence of low-sophistication malware that can cause significant harm to critical infrastructure could result in severe consequences.

Cybersecurity experts have called for greater efforts toward advanced threat detection and protection. Organizations must be vigilant and proactive in their approach to cybersecurity with a focus on identifying and stopping advanced threats before they cause damage.

Facebook and Instagram may be widely used by individuals and governments worldwide, but they are not immune to cyber espionage attempts by bad actors. The recent reports on APTs using these platforms to target South Asia are a reminder that cybersecurity has become an ever-more vital priority for nations and organizations as their digital dependence grows. To prevent cyber threats from causing significant damage, proactive steps must be taken to identify and prevent them.

Explore more

How Firm Size Shapes Embedded Finance Strategy

The rapid transformation of mundane business platforms into sophisticated financial ecosystems has effectively redrawn the competitive boundaries for companies operating in the modern economy. In this environment, the integration of banking, payments, and lending services directly into a non-financial company’s digital interface is no longer a luxury for the avant-garde but a baseline requirement for economic viability. Whether a company

What Is Embedded Finance vs. BaaS in the 2026 Landscape?

The modern consumer no longer wakes up with the intention of visiting a bank, because the very concept of a financial institution has migrated from a physical storefront into the digital oxygen of everyday life. This transformation marks the definitive end of banking as a standalone chore, replacing it with a fluid experience where capital management is an invisible byproduct

How Can Payroll Analytics Improve Government Efficiency?

While the hum of a government office often suggests a routine of paperwork and protocol, the digital pulses within its payroll systems represent the heartbeat of a nation’s economic stability. In many public administrations, payroll data is viewed as little more than a digital receipt—a record of transactions that concludes once a salary reaches a bank account. Yet, this information

Global RPA Market to Hit $50 Billion by 2033 as AI Adoption Surges

The quiet hum of high-speed data processing has replaced the frantic clicking of keyboards in modern back offices, marking a permanent shift in how global businesses manage their most critical internal operations. This transition is not merely about speed; it is about the fundamental transformation of human-led workflows into self-sustaining digital systems. As organizations move deeper into the current decade,

New AGILE Framework to Guide AI in Canada’s Financial Sector

The quiet hum of servers across Canada’s financial heartland now dictates more than just basic transactions; it increasingly determines who qualifies for a mortgage or how a retirement fund reacts to global volatility. As algorithms transition from the shadows of back-office automation to the forefront of consumer-facing decisions, the stakes for oversight have never been higher. The findings from the