• Home
    • What is
    • Computer security
      • Windows security
      • Mac security
      • Linux security
    • Mobile security
      • Android security
      • iOS Security
    • Data security
    • SCCM
    • Reviews
      • Case studies
    • Advertise
    • Contact
      • Privacy Policy
  • Subscribe now

    Loading
  • Home
  • What is
  • Computer security
    • Windows security
    • Mac security
    • Linux security
  • Mobile security
    • Android security
    • iOS Security
  • Data security
  • SCCM
  • Reviews
    • Case studies
  • Advertise
  • Contact
    • Privacy Policy
Home » Breaking data security Latest Cybersecurity News

Palestinian militant group employs Catfishing and lures Israelian soldiers to install Malicious Apps

John Greenwood Posted On February 17, 2020
1



Catfishing attack

Hamas Palestinian militant group executed a catfishing campaign by disguising as teenage girls to lure Israelian soldiers by interacting with them to perform social engineering attacks and install a malicious app on their mobile devices. Brigadier General Hild Silberman, the spokesperson of Israeli Defence Force (IDF) mentioned that they were able to identified and nullified the infections at an earlier state by taking down Hamas network. As General Silberman statement, only a few soldiers were affected by this catfishing attack.

What is Catfishing attack?

The process of faking identities with involvement in deceptive activities like sockpuppet to abuse, troll, or for fraudulent intentions is called as Catfishing attacks. With the development in social media, catfishing attacks are usually launched via dating apps as fake romance scams over a targeted individual or as a common threat. Attackers employ Instagram, Facebook, Twitter or dating apps to execute this methodology.

How did Israeli soldiers became victim to this threat?

Hamas group disguised themselves as a young teenage girls, who immigrated to Israel and aren’t efficient with the Hebrew language. The featured image above represents the six unique fake characters that were created to perform Catfishing on Israeli soldiers. The fake accounts were named as Maria Jacobova, Noa Danon, Rebecca Aboxis, Eden Ben Ezra, Sarah Orlova, and Yael Azoulay. 

Once these fake accounts establish contact with Israeli soldiers they were asked to install few chat apps, called Grixy, Zatu and Catch & See through which the fake accounts had promised to share more images of themselves.

After successful installation, the app shows some crash error and disappears from the application list. This creates a impression for the soldiers that the app had uninstalled itself, however the app remains in the device and continues to spy on soldier’s GPS location, SMS, photos, documents, and can even capture images using the device’s camera. 

Previous cases of catfishing attack

Hamas has already been involved in catfishing attacks in 2017 and 2018, when they deployed malicious dating and world cup apps to infect devices world wide. Catfishing attacks where attractive young girls were used for luring western military officials was executed by another militant group in Lebanon called Hezbollah. 

Social engineering is evolving everyday, beware of fake account and catfishing attacks to keep your data safe and secured. Establishing communication only with the trusted entity, and avoiding the download of malicious apps or clicking on the links they share could be the first step against catfishing threats. 

Share the article with your friends


catfishing attackcatfishing attack on Israel soldiersFake teenage girls accountsHamas lure Israel SoldiersPalestine lure Israelian soldiers over catfishingPalestinian militant group employs Catfishing to lure Israelian soldiers


Author

John Greenwood

He has been working with Cybersec and Infosec market for 12+ years now. Passionate about AI, Cybersecurity, Info security, Blockchain and Machine Learning. When he is not occupied with cybersecurity, he likes to go on bike rides!

1 Comment

AffiliateLabz
February 17, 2020 at 12:34 pm
Reply

Great content! Super high-quality! Keep it up! 🙂


Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Subscribe to our newsletter

    Loading
  • Windows security

    • Top 9 Best Log Management Tools for 2025
      September 20, 2025
    • Top 4 Remote Support Tools for 2025- Best Remote Support...
      September 18, 2025
    • Top 5 Best Unified Endpoint Management (UEM) Software...
      September 12, 2025
    • Top 5 Threat Intelligence Tools For 2025
      July 25, 2025
    • Top 5 Best Microsoft Intune Alternatives to Consider...
      July 23, 2025


  • About us

    Our vision is to deliver the trending and happening cyber events to the enthusiasts.

    We believe in delivering educational and quality content for hassle-free understanding of the subject.

  • Subscribe to our newsletter

    Loading
  • Follow us

  • Advertise with us

    You can reach us via Facebook, Linkedin, or Twitter for advertising purposes.


© The Cybersecurity Times 2022. All rights reserved.
Press enter/return to begin your search