Hamas sets 'honey traps' to hack Israeli soldiers' phones: army

Hamas used fake online identities and photos of young women to lure soldiers in


Reuters January 12, 2017
Hamas used fake online identities and photos of young women to lure soldiers in. PHOTO: AFP

Using photos of young women and Hebrew slang, the Palestinian militant group Hamas chatted up dozens of Israeli soldiers online, gaining control of their phone cameras and microphones, the military said on Wednesday.

An officer, who briefed reporters on the alleged scam, said the group that runs the Gaza Strip uncovered no major military secrets in the intelligence-gathering operation.

Hamas spokesman Fawzi Barhoum declined to comment.

Mainly using Facebook, Hamas used fake online identities and photos of young women, apparently found on the Internet, to lure soldiers in, the officer said.

FBI to gain expanded hacking powers as Senate effort to block fails

"Just a second, I'll send you a photo, my dear," one "woman" wrote.

"OK. Ha-ha," the soldier replied, before a photo of a blonde woman in a swimsuit popped up.

The "woman" then suggested they both download "a simple app that lets us have a video chat", according to an example of an exchange provided by the officer.

The officer said most of the soldiers were low-ranking and that Hamas was mostly interested in gathering information about Israeli army manoeuvres, forces and weaponry in the Gaza area.

This $5 USB device can hijack your computer in 30 seconds

The military discovered the hacking when soldiers began reporting other suspicious online activity on social networks and uncovered dozens of fake identities used by the group to target the soldiers, the officer said.

In 2001, a 16-year-old Israeli was lured to the occupied West Bank, where he was shot dead by Palestinian gunmen, after entering into an online relationship with a Palestinian woman who posed as an American tourist.

COMMENTS

Replying to X

Comments are moderated and generally will be posted if they are on-topic and not abusive.

For more information, please see our Comments FAQ