Meta Cracks Down on Bitter APT and APT36 Cyber Espionage: What Organizations Must Know in 2026
Meta said measures have been taken against two cyber espionage operations in South Africa. This was made by the company last Thursday in its quarterly conflict threat report. Bitter used a variety of malicious tactics to target people online through social engineering and infect their devices with malware.
Meta Cracks Down on Bitter APT and APT36 Cyber Espionage Operations in South Africa
In a significant move against cyber espionage, Meta took action against two advanced persistent threat (APT) groups, Bitter APT and APT36, targeting individuals and organizations across South Asia, the Middle East, and South Africa. The disclosure came through Meta's Quarterly Conflict Threat Report for Q2 2022. Although this incident dates to 2022, the tactics used by both groups remain directly relevant in 2026: social media based social engineering, mobile malware, and spear phishing continue to be among the most common initial access techniques used by state sponsored threat actors globally. Learn more: What Is Phishing and How To Protect Yourself From It.
Meta’s Security Response Against Bitter APT
Bitter APT is a cyber espionage group primarily targeting New Zealand, India, Pakistan, and the UK through elaborate social engineering and malware tactics. Though Bitter APT’s operations are considered low complexity, they are notable for their persistence and ability to evade detection. Here’s an in depth look at Bitter’s strategies and Meta’s counteractions.
How Bitter APT Executes Cyber Attacks
Bitter APT uses multiple tactics to distribute malware and deceive its targets, typically involving:
- Social engineering techniques: Bitter APT often uses fake profiles and carefully crafted messages to trick users into sharing sensitive information or clicking on malicious links.
- Malicious domains and compromised websites: They set up deceptive websites that appear trustworthy to lure victims into downloading malware.
- Link shortening services and third party hosting: These services make it challenging to track and block malicious links, allowing Bitter to reach more victims with disguised URLs.
Tactics, Techniques, and Procedures (TTPs)
Bitter’s TTPs often involve using an iOS app, Android based malware known as Dracarys, and various social engineering adaptations to avoid detection. While the group’s technical complexity is relatively low, their understanding of user behavior allows them to bypass initial security measures effectively.
Meta’s threat analysis identified and removed these malicious networks and enhanced monitoring to prevent future incidents. By neutralizing Bitter’s activities, Meta significantly disrupted the group’s cyber espionage operations, limiting its access to victims on Meta’s platforms.
The Tactics Behind APT36’s Campaigns
APT36 has been known to leverage phishing attacks, malicious attachments, and spear phishing to access classified or sensitive information. Though APT36’s clearance level for TTPs is relatively low, they utilize methods that are effective in targeting specific groups. Their approach commonly includes:
- Phishing attacks via email and social media: These attempts to steal login credentials often use urgent or fear inducing messages to persuade users to respond.
- Malicious attachments and links: These infect a target’s device upon download, potentially giving APT36 remote access to sensitive data.
- Spear phishing campaigns: APT36 carefully researches and tailors messages to appeal directly to high value targets, such as government officials or military personnel.
Meta’s investigative team was able to identify APT36’s tactics and prevent their activities on its platforms. The efforts taken reflect Meta’s ongoing mission to protect user data and disrupt coordinated cyber threats.
Global Impact and Implications for Cybersecurity
The crackdown on Bitter APT and APT36 exemplifies how social media and technology companies can mitigate cyber espionage threats. As these groups increasingly rely on sophisticated social engineering tactics and malware, global platforms like Meta play a critical role in identifying and curtailing malicious operations.
Understanding the Global Threat Landscape
Both Bitter APT and APT36 showcase how state sponsored and independent cyber espionage groups can exploit platforms to distribute malware and infiltrate organizations. By targeting a range of industries and sectors, these groups illustrate the broad impact of cyber espionage in today’s digital landscape.
Meta’s Proactive Measures in Cybersecurity
Meta’s success in countering these operations also underscores the importance of proactive monitoring, data sharing, and collaboration among tech companies and governments. With its quarterly threat reports, Meta provides transparency into emerging threats and a model for other companies to emulate in their security measures.
Why Bitter APT and APT36 Tactics Still Matter in 2026
The methods used by Bitter APT and APT36 in 2022 remain highly relevant today. Social engineering through fake social media profiles, mobile malware delivered via messaging platforms, and spear phishing targeting government officials and military personnel are all techniques that continue to be widely used by state affiliated threat actors in 2026. The groups that succeed in cyber espionage rarely invent new techniques. They refine and persist with proven ones.
For organizations, the lesson is clear: protecting against APT style attacks requires a combination of technical controls and trained employees who recognize social engineering attempts. Attackers who cannot compromise technical defenses will target the human layer. They will pose as recruiters, journalists, researchers, or colleagues on LinkedIn, WhatsApp, Facebook, and email to establish trust before delivering malware or harvesting credentials.
How Keepnet Helps Organizations Defend Against Social Engineering and APT Tactics
Keepnet's platform directly addresses the human layer vulnerabilities that groups like Bitter APT and APT36 exploit most effectively.
- Phishing Simulator: Trains employees to recognize and report spear phishing emails, fake credential harvesting pages, and social engineering lures that mirror real APT tactics.
- Security Awareness Training: Delivers role based training on identifying suspicious social media contact, malicious attachments, and fake profiles used in social engineering campaigns.
- Vishing Simulator: Tests employee resilience against voice based social engineering, a technique APT groups use to establish initial contact or verify targets before deploying malware.
- Incident Responder: Enables rapid triage and removal of suspicious emails from all inboxes, reducing the window between delivery of a malicious message and containment.
Editor's Note: This article was updated on May 20, 2026.