Hamas Android Malware On IDF Soldiers-This is How it Happened

[correlate]

Level 18
Thread author
Verified
Top Poster
Well-known
Forum Veteran
May 4, 2019
792
9,574
1,670
New York
This MRAT (Mobile Remote Access Trojan) is disguised as a set of dating apps, “GrixyApp”, “ZatuApp”, and “Catch&See”, all with dedicated websites, and descriptions of dating applications.

The victims received a link to download the malicious application from a Hamas operator disguising themselves as an attractive woman. Once the application is installed and executed, it shows an error message stating that the device is not supported, and the app will uninstall itself – which actually does not happen, and the app only hides its icon.
 
Two observations:
1) How is it possible that IDF soldiers were allowed to use a personal smartphone while on duty? In a delicate situation like the one in which those specific soldiers operate, ISA should not have allowed the use of unsafe smartphones.
2) If the phones used were provided by the IDF, how was it possible to install third-party apps (regardless of whether they contained malware or not)?
 
Two observations:
1) How is it possible that IDF soldiers were allowed to use a personal smartphone while on duty? In a delicate situation like the one in which those specific soldiers operate, ISA should not have allowed the use of unsafe smartphones.
2) If the phones used were provided by the IDF, how was it possible to install third-party apps (regardless of whether they contained malware or not)?

Important questions
I do not know what kind of protection the members of the Israeli army were receiving
It may be the use of a personal side phone
They were previously hacked in the same way.
 
  • Like
Reactions: Outpost