Threat Intelligence Tarot
cups · 9
Private sector (suspected Gulf state contractor)
G1060
risk 4/5
The Persona Collective
Bahamut
Bahamut APT
Middle East activistsJournalistsReligious groupsSouth Asian governments
Active since ~2016 · Targeted surveillance, Dissident monitoring, Mobile device compromise
The Persona Collective built fake news websites, maintained social media identities for years, and used them to gain the trust of journalists and activists before deploying mobile spyware. It is the most elaborate persona operation ever documented by a private surveillance contractor.
Tactics & Techniques
RCN
RDV
INI
EXC
PRS
PRV
EVA
CRD
DSC
LAT
COL
C2
EXF
IMP
T1585.001
Social Media Accounts
Resource Development
T1566.002
Spearphishing Link
Initial Access
T1071.001
Web Protocols
Command and Control
T1056.001
Keylogging
Collection
T1125
Video Capture
Collection
Notable Operations
  • Fake news websites to build credibility for persona approach
  • iOS and Android spyware disguised as legitimate apps
  • Fake dating apps and VPN apps used as mobile implants
  • Targeted Sikh community, journalists, and Middle Eastern activists
Defenses
  • Mobile device management with app allowlisting
    NIST SP 800-124
  • iOS and Android app source verification - official stores only
    CIS Mobile Security
  • Journalist and activist digital security training
    Access Now Digital Security
  • Social engineering awareness for persona-based approaches
    NIST SP 800-50
Reversed: Their Weakness
Bahamut's extensive fake infrastructure - the news websites, the Twitter accounts, the VPN apps - created a sprawling digital footprint that Bellingcat, CitizenLab, and BlackBerry researchers mapped comprehensively, providing an unusually complete picture of a private intelligence contractor's operations.

Share this adversary profile

swipe to browse

Data sourced from MITRE ATT&CK. For educational purposes.