{"id":43943,"date":"2021-11-16T15:26:52","date_gmt":"2021-11-16T15:26:52","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32824\/Pakistan-Hackers-Targeted-Afghan-Users-Amid-Govt-Collapse.html"},"modified":"2021-11-16T15:26:52","modified_gmt":"2021-11-16T15:26:52","slug":"pakistan-hackers-targeted-afghan-users-amid-govt-collapse","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/","title":{"rendered":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/www.reuters.com\/resizer\/sxdrSlbgOyBRGP67qwH94mmExH8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/ONNE6F7VXVOHBIFDT25VSOL2BU.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p id=\"primary-image-caption\" data-testid=\"primary-image-caption\">An illustration picture shows a projection of binary code on a man holding a laptop computer, in an office in Warsaw June 24, 2013. REUTERS\/Kacper Pempel\/File Photo<\/p>\n<div readability=\"110.18032287542\">\n<p data-testid=\"paragraph-0\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Nov 16 (Reuters) &#8211; Hackers from Pakistan used Facebook to target people in Afghanistan with connections to the previous government during the Taliban&#8217;s takeover of the country, the company&#8217;s threat investigators said in an interview with Reuters.<\/p>\n<p data-testid=\"paragraph-1\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Facebook <a href=\"https:\/\/www.reuters.com\/companies\/FB.O\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">(FB.O)<\/a> said the group, known in the security industry as SideCopy, shared links to websites hosting malware which could surveil people&#8217;s devices. Targets included people connected to the government, military and law enforcement in Kabul, it said. Facebook said it removed SideCopy from its platform in August.<\/p>\n<p data-testid=\"paragraph-2\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">The social media company, which recently <a href=\"https:\/\/www.reuters.com\/technology\/facebooks-zuckerberg-kicks-off-its-virtual-reality-event-with-metaverse-vision-2021-10-28\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">changed its name to Meta<\/a>, said the group created fictitious personas of young women as &#8220;romantic lures&#8221; to build trust and trick targets into clicking phishing links or downloading malicious chat apps. It also compromised legitimate websites to manipulate people into giving up their Facebook credentials.<\/p>\n<p data-testid=\"paragraph-3\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">&#8220;It&#8217;s always difficult for us to speculate as to the end goal of the threat actor,&#8221; said Facebook&#8217;s head of cyber espionage investigations, Mike Dvilyanski. &#8220;We don&#8217;t know exactly who was compromised or what the end result of that was.&#8221;<\/p>\n<p data-testid=\"paragraph-4\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Major online platforms and email providers including Facebook, Twitter Inc <a href=\"https:\/\/www.reuters.com\/companies\/TWTR.N\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">(TWTR.N)<\/a>, Alphabet Inc&#8217;s <a href=\"https:\/\/www.reuters.com\/companies\/GOOGL.O\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">(GOOGL.O)<\/a> Google and Microsoft Corp&#8217;s <a href=\"https:\/\/www.reuters.com\/companies\/MSFT.O\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">(MSFT.O)<\/a> LinkedIn have said they took steps to lock down Afghan users&#8217; accounts during the Taliban&#8217;s swift takeover of the country this past summer. <a href=\"https:\/\/www.reuters.com\/technology\/facebook-says-it-is-securing-afghan-user-accounts-amid-taliban-takeover-2021-08-19\/\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\"> read more <\/a><\/p>\n<p data-testid=\"paragraph-5\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Facebook said it had not previously disclosed the hacking campaign, which it said ramped up between April and August, due to safety concerns about its employees in the country and the need for more work to investigate the network. It said it shared information with the U.S. State Department at the time it took down the operation, which it said had appeared &#8220;well-resourced and persistent.&#8221;<\/p>\n<p data-testid=\"paragraph-6\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Investigators also said Facebook had last month disabled the accounts of two hacking groups which it linked to Syria&#8217;s Air Force Intelligence.<\/p>\n<p data-testid=\"paragraph-7\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Facebook said one group, known as the Syrian Electronic Army, targeted human rights activists, journalists and others opposing the ruling regime, while the other, known as APT-C-37, targeted people linked to the Free Syrian Army and former military personnel who had joined opposition forces.<\/p>\n<p data-testid=\"paragraph-8\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Facebook&#8217;s head of global threat disruption, David Agranovich, said the Syria and Afghanistan cases showed cyber espionage groups leveraging periods of uncertainty during conflicts when people might be more susceptible to manipulation.<\/p>\n<p data-testid=\"paragraph-9\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">The company said a third hacking network in Syria, which it linked to the Syrian government and removed in October, targeted minority groups, activists and members of the People&#8217;s Protection Units (YPG) and Syria Civil Defense, or White Helmets.<\/p>\n<p data-testid=\"paragraph-10\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">It said this group used Facebook for social engineering and sharing malicious links to attacker-controlled sites mimicking apps and updates around the United Nations, White Helmets, YPG, Facebook-owned WhatsApp and Alphabet&#8217;s <a href=\"https:\/\/www.reuters.com\/companies\/GOOGL.O\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">(GOOGL.O)<\/a> YouTube.<\/p>\n<p data-testid=\"paragraph-11\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">A Facebook spokeswoman said the company had notified about 2,000 users affected by the campaigns in Afghanistan and Syria, the majority in Afghanistan.<\/p>\n<p><span class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__default___1Xh7Yh SignOff__text___2onKdN\">Reporting by Elizabeth Culliford in New York<br \/>\nEditing by Matthew Lewis and Jonathan Oatis<\/span><\/p>\n<p class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__regular___Bh17t- Text__large___1i0u1F Body__base___25kqPt Body__large_body___3g04wK ArticleBody__element___3UrnEs\">Our Standards: <a href=\"https:\/\/www.thomsonreuters.com\/en\/about-us\/trust-principles.html\" target=\"_blank\" class=\"Text__text___3eVx1j Text__dark-grey___AS2I_p Text__medium___1ocDap Text__large___1i0u1F Link__underline_default___MkI7S8\" rel=\"noopener\">The Thomson Reuters Trust Principles.<\/a><\/p>\n<\/div>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32824\/Pakistan-Hackers-Targeted-Afghan-Users-Amid-Govt-Collapse.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43944,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9731],"class_list":["post-43943","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackergovernmentphishfacebooksocialpakistanafghanistan"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-16T15:26:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.reuters.com\/resizer\/sxdrSlbgOyBRGP67qwH94mmExH8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/ONNE6F7VXVOHBIFDT25VSOL2BU.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse\",\"datePublished\":\"2021-11-16T15:26:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/\"},\"wordCount\":555,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg\",\"keywords\":[\"headline,hacker,government,phish,facebook,social,pakistan,afghanistan\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/\",\"name\":\"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg\",\"datePublished\":\"2021-11-16T15:26:52+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,government,phish,facebook,social,pakistan,afghanistan\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackergovernmentphishfacebooksocialpakistanafghanistan\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/","og_locale":"en_US","og_type":"article","og_title":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-11-16T15:26:52+00:00","og_image":[{"url":"https:\/\/www.reuters.com\/resizer\/sxdrSlbgOyBRGP67qwH94mmExH8=\/1200x628\/smart\/filters:quality(80)\/cloudfront-us-east-2.images.arcpublishing.com\/reuters\/ONNE6F7VXVOHBIFDT25VSOL2BU.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse","datePublished":"2021-11-16T15:26:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/"},"wordCount":555,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg","keywords":["headline,hacker,government,phish,facebook,social,pakistan,afghanistan"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/","url":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/","name":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg","datePublished":"2021-11-16T15:26:52+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/11\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/pakistan-hackers-targeted-afghan-users-amid-govt-collapse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,government,phish,facebook,social,pakistan,afghanistan","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackergovernmentphishfacebooksocialpakistanafghanistan\/"},{"@type":"ListItem","position":3,"name":"Pakistan Hackers Targeted Afghan Users Amid Govt Collapse"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43943","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43943"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43943\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43944"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43943"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43943"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43943"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}