<p>Israel Defense Forces (IDF) has revealed that it thwarted Hamas militants from launching a major cybersecurity attack.</p>.<p>Apparently, Hamas hackers are using catfishing tactics, wherein they create fake social media profiles of young attractive Israeli women on Facebook Telegram, Facebook and WhatsApp, to lure Israel military officials. And, once gaining the trust, they tried to trick them to download trojan-laced Android dating apps such as GrixyApp, ZatuApp, and Catch&See on their mobiles.</p>.<p>The aforementioned <a href="https://www.deccanherald.com/specials/beware-of-these-malicious-android-apps-on-google-play-store-802769.html" target="_blank">apps </a>even had dedicated benign-looking websites (see below) to come off as genuine and hoodwink the victims to download them. The apps reportedly had Mobile Remote Access Trojans (MRAT), that used retrieve phone numbers, location, SMS messages and more and send them to a remote server. Also, the Hamas hackers were also able to take control of the phone's mic and camera to record audios and videos as well. </p>.<p>Must read | <a href="https://www.deccanherald.com/specials/trojan-alert-hackers-misuse-coronavirus-outbreak-to-spread-pc-malware-801155.html" target="_blank">Trojan alert: Hackers misuse Coronavirus outbreak to spread PC malware</a></p>.<p>"The victims received a link to download the malicious application from a Hamas operator disguising themselves as an attractive woman. Once the application is installed and executed, it shows an error message stating that the device is not supported, and the app will uninstall itself – which actually does not happen, and the app only hides its icon," Checkpoint Research security said citing the official IDF document.</p>.<p>But before Hamas could carry out full-fledged espionage on the IDF' officials, the latter's advanced security firewall detected the suspicious behaviour of the apps and even took down the websites.</p>.<p>"Hamas created fake social media profiles, using photos including this one, in an attempt to hack the phones of IDF soldiers. What Hamas didn’t know was that Israeli intelligence caught onto their plot, tracked the malware & downed Hamas’ hacking system. #CatfishCaught," Israel Defense Forces said on Twitter</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/hackers-can-hijack-philips-smart-bulb-to-spread-spyware-check-point-security-801996.html" target="_blank">Hackers can hijack Philips smart bulb to spread spyware</a></p>.<p>This incident is a stark reminder of why the government, particularly military agencies not just Israel, but also globally, should create a robust security system or dedicated application for soldiers' mobiles to monitor suspicious behaviour and nip it in the bud, before its too late.</p>.<p><i>Get the latest news on new launches, gadget reviews, apps, cyber security and more on personal technology only on <b><a href="https://www.deccanherald.com/tag/dh-tech" target="_blank">DH Tech</a>.</b></i></p>
<p>Israel Defense Forces (IDF) has revealed that it thwarted Hamas militants from launching a major cybersecurity attack.</p>.<p>Apparently, Hamas hackers are using catfishing tactics, wherein they create fake social media profiles of young attractive Israeli women on Facebook Telegram, Facebook and WhatsApp, to lure Israel military officials. And, once gaining the trust, they tried to trick them to download trojan-laced Android dating apps such as GrixyApp, ZatuApp, and Catch&See on their mobiles.</p>.<p>The aforementioned <a href="https://www.deccanherald.com/specials/beware-of-these-malicious-android-apps-on-google-play-store-802769.html" target="_blank">apps </a>even had dedicated benign-looking websites (see below) to come off as genuine and hoodwink the victims to download them. The apps reportedly had Mobile Remote Access Trojans (MRAT), that used retrieve phone numbers, location, SMS messages and more and send them to a remote server. Also, the Hamas hackers were also able to take control of the phone's mic and camera to record audios and videos as well. </p>.<p>Must read | <a href="https://www.deccanherald.com/specials/trojan-alert-hackers-misuse-coronavirus-outbreak-to-spread-pc-malware-801155.html" target="_blank">Trojan alert: Hackers misuse Coronavirus outbreak to spread PC malware</a></p>.<p>"The victims received a link to download the malicious application from a Hamas operator disguising themselves as an attractive woman. Once the application is installed and executed, it shows an error message stating that the device is not supported, and the app will uninstall itself – which actually does not happen, and the app only hides its icon," Checkpoint Research security said citing the official IDF document.</p>.<p>But before Hamas could carry out full-fledged espionage on the IDF' officials, the latter's advanced security firewall detected the suspicious behaviour of the apps and even took down the websites.</p>.<p>"Hamas created fake social media profiles, using photos including this one, in an attempt to hack the phones of IDF soldiers. What Hamas didn’t know was that Israeli intelligence caught onto their plot, tracked the malware & downed Hamas’ hacking system. #CatfishCaught," Israel Defense Forces said on Twitter</p>.<p>Must read | <a href="https://www.deccanherald.com/specials/hackers-can-hijack-philips-smart-bulb-to-spread-spyware-check-point-security-801996.html" target="_blank">Hackers can hijack Philips smart bulb to spread spyware</a></p>.<p>This incident is a stark reminder of why the government, particularly military agencies not just Israel, but also globally, should create a robust security system or dedicated application for soldiers' mobiles to monitor suspicious behaviour and nip it in the bud, before its too late.</p>.<p><i>Get the latest news on new launches, gadget reviews, apps, cyber security and more on personal technology only on <b><a href="https://www.deccanherald.com/tag/dh-tech" target="_blank">DH Tech</a>.</b></i></p>