This is how Hamas' "beauties" hacked into the phones of Israeli officers!

    A recent report published by Al Jazeera Net revealed the most prominent operations of the Qassam cyber unit carried out by the "Hamas benefactors", targeting Israeli security systems.

    According to the report, Hamas has reversed the game in its favor and is using social networking sites to entrap Israeli army officers with the help of good girls.

    The Israeli intelligence services usually used this method, to entrap young Palestinians to recruit with them.

    Hamas's "benevolence" is the most prominent of its operations. Learn about the Qassam cyber unit that targeted Israeli security systems https://t.co/Jo09QcQlyq via @ajanet_ar

    — ISMAT (@ISMAT315) October 12, 2022

    In 2017, Hamas "beauties" held conversations with dozens of Israeli soldiers from fake accounts, asking them to download a phone app, through which their phones were hacked and taken over.

    The accounts of the beautiful girls on #فيسبوك topple the occupation soldiers.. #هكر_حماس pic.twitter.com/sBfkBGg0ng

    — Al Jazeera (@AJArabic) January 13, 2017

    Hebrew media said at the time that Hamas had signed up a number of army soldiers through fake accounts, and had already obtained important information including images of military bases by eavesdropping on communications.

    It quoted one of these soldiers as believing that he had fallen in love with a Brazilian girl and revealed his secrets to her, until he eventually realized that she was nothing but a Hamas member in Gaza.

    Later, the Qassam Brigades revealed some details of this operation, one of its most prominent "cyber" attacks, and was termed the "ambush of Hamas' benefactors."

    It said engineer commander Sami Radwan, who was assassinated by Israel during the battle for the "sword of Jerusalem," was behind the ambush.

    According to what the Phalanges allowed to be published, the information obtained by Radwan contributed to the drawing up of plans and changed many of the means of conflict with the occupation, as well as his great role in establishing the internal military communications network and protecting it from infiltration.

    Israeli Defense Ministry: Hamas hacked the phones of officers from the General Staff after deceiving them with photos of beauties on Facebook!! pic.twitter.com/vWM9kJQquH

    — Abdullah Al-Ali (@CyberkovCEO) January 12, 2017

    The Israeli army revealed that 16 fake accounts were used by Hamas intelligence elements to entrap the soldiers, while keeping others under investigation to study charges against the soldiers who fell into the trap.

    In April 2022, a Hebrew channel quoted the cyber defense company Cybereason as saying that Hamas' cyber arm had organized a large-scale espionage campaign, targeting Israeli figures working in the security services through "seduction girls."

    Over the past few years, Sabrizen's team has closely followed the activities of various attack groups against targets in the Middle East, and in recent months has noted a marked increase in the activity of APT-C-23, Hamas' main cyber arm.

    As part of the study, the team discovered 3 new and complex harms, along with attackers' abilities to use Hebrew and create fake profiles in an accurate and reliable manner.

    If most of the offensive activity in the past focused on Arabic-speaking victims, today there is a widespread attempt to infiltrate dozens of Israelis, the vast majority of whom are men serving in the military, law enforcement organizations and emergency services, the channel said.

    She pointed out that it is noted in the current attack carried out by Hamas elements that the tools used in the attack are sophisticated, and included the use of undeclared damage in order to access the victims' mobile devices and computers, for the purpose of spying and revealing sensitive information.

    According to the research team, "the first point of contact between the attackers and the victims was through Facebook, where the attackers created fake characters of girls, and they worked intensively to create trusted profiles, by uploading posts frequently, crafting them in the correct Hebrew language, sharing photos, joining active groups, and adding friends of the victims to create a trusted personality in the field."

    The research team went on to claim that once the relationship between the attacker and the victim was established, a chat conversation began in the app that lasted for a long time and included sexual content, and at some point, the attackers encouraged the victim to switch to a more intimate conversation on WhatsApp.

    After answering the request, the attackers acted in two ways: If the call was made via mobile phone, the attacker asks the victim to download a "secure" app to follow the call. The app looked like a seemingly innocent app, but it included a file installed on the mobile device, and once activated, the attacker had full control over the victim's mobile device, including access to the microphone, camera, photos, and other apps on the device.

    The second method was to penetrate the internal networks of the Israeli security services, if Hamas attackers persuaded the Israelis to communicate with them using computers in the workplace, and interact with them during working hours.

    According to the channel, the targeted Israeli figures were tempted to send a link to download an intimate video, and once the link is opened, a program is downloaded that gives the electronic arm of Hamas full access to the computer, including the ability to extract information on it or on the company's network.

    The Sabrizen research team told the Israeli channel that the espionage campaign represents an important development in Hamas' offensive capabilities.

    Nearly 10 years after the first cyberattack carried out by the Palestinian resistance in Gaza against Israeli targets, the Izz al-Din al-Qassam Martyr Brigades, the military wing of the Islamic Resistance Movement (Hamas), unveiled a cyber unit specialized in carrying out cyberattacks against Israel.

    The first cyberattack by the Qassam Brigades came during what it called the "Battle of the Stones of the Rocks" in response to the Israeli aggression in 2012, through which it succeeded in penetrating more than 5,000 mobile phones of officers and soldiers in the occupation army, and this formed the "first nucleus" of the electronic unit that surrounds it with a large company.

    SOURCE (Translated from Arabic )

    Donate to support Ujasusi Blog, click photo below

    Screenshot--43-
    Evarist Chahali

    Evarist Chahali

    Read more posts by this author.