April 26, 2024

Friday, April 26, 2024
April 26, 2024

Support Biblical Truth 

untitled artwork

untitled artwork

World news biblically understood

TRENDING:

IDF Foiled Hamas Attempt to Hack Soldiers’ Mobile Phones

The IDF has foiled a third Hamas network posing as attractive young women on social networks that lures in IDF soldiers in order to access as much information and intelligence on the army that they can.

The phones of hundreds of soldiers, including combat soldiers, were compromised in the third such Hamas honeypot operation foiled by the Israeli military and the Shin Bet (Israel Security Service) since 2017.

According to the military, there have been a number of improvements by Hamas, including the use of new platforms like Telegram alongside Instagram, Facebook and WhatsApp.

Hamas, the military said, improved its ability to start a dialogue with soldiers, using hashtags and use of slang. The group also started sending voice messages in an attempt to make the enemy account sound more believable.

The IDF identified six main characters used by Hamas, many of whom presented themselves as new immigrants to Israel with hearing or vision problems to explain for their less-than fluent Hebrew.

The characters were: Sara Orlova, Maria Jacobova, Eden Ben Ezra, Noa Danon, Yael Azoulay and Rebecca Abuksis. In addition to using the same characters on various platforms to boost it’s credibility, Hamas is said to have edited the pictures of the characters, making it more difficult to find the original source of the picture.

The new applications used by Hamas included three social networking applications: GrixyApp, ZatuApp and Catch&See. According to the military, unlike the previous honeypot attempts by Hamas, these applications were not accessible through app stores, but could only be downloaded from links sent to soldiers by the Hamas operative.

Prior to being downloaded, the application would ask for permission to several applications on the user’s phone, including those used by other applications for legitimate reasons like access to location, camera, microphone, etc.

Immediately after downloading the application, it appeared as an icon, but once clicked on it would open with an error message that the device doesn’t support the version of the application and would then seem to delete itself from the user’s phone.

But while the application seemed to have disappeared from the phone, the virus remained and gave direct access to Hamas, which would be able to take control of the device.

Once on the phone, the virus would give Hamas operatives control over all aspects of the phone, including pictures, the soldier’s location, text messages and the soldier’s contact list. The virus would also have access to the phone’s camera and microphone, taking pictures and recording conversations remotely without the soldier knowing.

Unlike in previous attempts by Hamas, the group also was able to download and transfer files and have access to the phone’s GPS, allowing them to know the infected device’s location. At that point, the Hamas operatives would stop communicating with the soldiers.

While the military knew about Hamas’s operation for the past several months, it was decided to let them continue to enable the IDF to have more effective technological means to stop the terror group.

The head of the IDF’s operational security department, Col. “R” said that the military was not surprised that Hamas has kept trying to honeypot Israeli soldiers, and expects that it would not be the last time that such cyber plots would be attempted by the terror group.

The IDF said that there was no damage to national security and that the soldiers who have had their phones hacked – mainly conscripted soldiers and low-ranking officers – would be called in to have the virus disabled on their phones.

The army has reiterated to soldiers to follow its cautious guidelines for the use of social networks: only confirming friendship requests from people one knows personally; to not upload any classified information to any social network; and to only download applications from the original App Store (rather than downloading applications from links).

The military has also recommended that if a soldier is approached by a stranger online, to be aware that it might be an attempt to honeypot them, especially if the suspicious individual is unable to meet in person.

The IDF has urged all soldiers to report to their commander and security officials if the suspicious individual asks them to download applications and if they feel that their phone may have been compromised.

CLICK HERE FOR
SOURCE

Today's News Needs A Biblical Analysis.

Your Gift Today Helps Harbinger's Daily Reach More People With The Truth of God's Word.

Trusted Analysis From A Biblical Worldview

Help reach the lost and equip the church with the living and active truth of God's Word in our world today.

YOU CARE ABOUT

BIBLICAL TRUTH. SO DO WE.

 

Together, We Can Deliver A Biblical Understanding

Of News Events Around The World.

LIVE UPDATES — Johnson Calls University Pres. To Resign: ‘Columbia Has Allowed Lawless Agitators And Radicals To Take Over’

Pray For Israel — Psalm 122:6-8, "Pray for the peace of Jerusalem: they shall prosper that love thee. Peace be within thy walls, and prosperity within thy palaces. For my brethren and companions' sakes, I will now say, Peace be within thee."

The Best Way To Contain This Global Threat Is For America To Stand With Israel

What every evil opportunistic leader in the world sees is an America whose president is vacillating in his support of Israel. Joe Biden is so afraid of the young pro-Hamas, extremist protestors in his party that he refuses to send a message of resolve to Iran — and anyone who would prey on the Jewish state.

untitled artwork 6391

In A World Encased In Violence, Prophecy Is The Stabiliser Of Our Faith

God did not provide His Word so that it would simply die in the hands of the spiritually dead. He expected, as evidenced by Habakkuk, that it be shared – particularly that which was warning people of the two paths available – righteousness or wickedness. 

ABC's of Salvation

TV AD

worldview matters

Decision Magazine V AD

TV AD

Amir V Ad #1

Decision Magazine V AD

The IDF has foiled a third Hamas network posing as attractive young women on social networks that lures in IDF soldiers in order to access as much information and intelligence on the army that they can.

The phones of hundreds of soldiers, including combat soldiers, were compromised in the third such Hamas honeypot operation foiled by the Israeli military and the Shin Bet (Israel Security Service) since 2017.

According to the military, there have been a number of improvements by Hamas, including the use of new platforms like Telegram alongside Instagram, Facebook and WhatsApp.

Hamas, the military said, improved its ability to start a dialogue with soldiers, using hashtags and use of slang. The group also started sending voice messages in an attempt to make the enemy account sound more believable.

The IDF identified six main characters used by Hamas, many of whom presented themselves as new immigrants to Israel with hearing or vision problems to explain for their less-than fluent Hebrew.

The characters were: Sara Orlova, Maria Jacobova, Eden Ben Ezra, Noa Danon, Yael Azoulay and Rebecca Abuksis. In addition to using the same characters on various platforms to boost it’s credibility, Hamas is said to have edited the pictures of the characters, making it more difficult to find the original source of the picture.

The new applications used by Hamas included three social networking applications: GrixyApp, ZatuApp and Catch&See. According to the military, unlike the previous honeypot attempts by Hamas, these applications were not accessible through app stores, but could only be downloaded from links sent to soldiers by the Hamas operative.

Prior to being downloaded, the application would ask for permission to several applications on the user’s phone, including those used by other applications for legitimate reasons like access to location, camera, microphone, etc.

Immediately after downloading the application, it appeared as an icon, but once clicked on it would open with an error message that the device doesn’t support the version of the application and would then seem to delete itself from the user’s phone.

But while the application seemed to have disappeared from the phone, the virus remained and gave direct access to Hamas, which would be able to take control of the device.

Once on the phone, the virus would give Hamas operatives control over all aspects of the phone, including pictures, the soldier’s location, text messages and the soldier’s contact list. The virus would also have access to the phone’s camera and microphone, taking pictures and recording conversations remotely without the soldier knowing.

Unlike in previous attempts by Hamas, the group also was able to download and transfer files and have access to the phone’s GPS, allowing them to know the infected device’s location. At that point, the Hamas operatives would stop communicating with the soldiers.

While the military knew about Hamas’s operation for the past several months, it was decided to let them continue to enable the IDF to have more effective technological means to stop the terror group.

The head of the IDF’s operational security department, Col. “R” said that the military was not surprised that Hamas has kept trying to honeypot Israeli soldiers, and expects that it would not be the last time that such cyber plots would be attempted by the terror group.

The IDF said that there was no damage to national security and that the soldiers who have had their phones hacked – mainly conscripted soldiers and low-ranking officers – would be called in to have the virus disabled on their phones.

The army has reiterated to soldiers to follow its cautious guidelines for the use of social networks: only confirming friendship requests from people one knows personally; to not upload any classified information to any social network; and to only download applications from the original App Store (rather than downloading applications from links).

The military has also recommended that if a soldier is approached by a stranger online, to be aware that it might be an attempt to honeypot them, especially if the suspicious individual is unable to meet in person.

The IDF has urged all soldiers to report to their commander and security officials if the suspicious individual asks them to download applications and if they feel that their phone may have been compromised.

CLICK HERE FOR
SOURCE

Today's News Needs A Biblical Analysis.

Your Gift Today Helps Harbinger's Daily Reach More People With The Truth of God's Word.

LIVE UPDATES — Johnson Calls University Pres. To Resign: ‘Columbia Has Allowed Lawless Agitators And Radicals To Take Over’

Pray For Israel — Psalm 122:6-8, "Pray for the peace of Jerusalem: they shall prosper that love thee. Peace be within thy walls, and prosperity within thy palaces. For my brethren and companions' sakes, I will now say, Peace be within thee."

The Best Way To Contain This Global Threat Is For America To Stand With Israel

What every evil opportunistic leader in the world sees is an America whose president is vacillating in his support of Israel. Joe Biden is so afraid of the young pro-Hamas, extremist protestors in his party that he refuses to send a message of resolve to Iran — and anyone who would prey on the Jewish state.

sign up

In A World Encased In Violence, Prophecy Is The Stabiliser Of Our Faith

God did not provide His Word so that it would simply die in the hands of the spiritually dead. He expected, as evidenced by Habakkuk, that it be shared – particularly that which was warning people of the two paths available – righteousness or wickedness. 

ABC's of Salvation

TV AD

worldview matters

Decision Magazine V AD

TV AD

Amir V Ad #1

Decision Magazine V AD