IDF Launches Campaign Against Hamas Catfishing Apps
JERUSALEM (JTA) — The Israel Defense Forces has launched a campaign to prevent its soldiers from being tricked by hackers from terrorist groups attempting to install spyware on their cell phones.
The IDF announced on Tuesday that it had launched Operation Broken Heart, so named because operatives pose on social media as attractive females to convince the soldiers to download infected applications for dating websites, as well as another about the FIFA World Cup.
This is not the first time that Hamas and other terror groups have attempted to infiltrate the IDF via soldiers’ cellphones and social networks. A previous campaign known as Operation Hunters Battle exposed the false identities terror groups used to attract soldiers, in order to raise soldiers’ awareness of the phenomenon and the importance of reporting incidents when they occur.
Over 100 soldiers have been fooled into downloading the infected apps in the last six months, according to the IDF. Under the plot, the operatives befriended the soldiers on social media and then convinced them to download an infected app to their cellphone, giving the terrorists access to all of the information of their phones as well as turning on the recording devices and cameras on the phones.
The names of the apps are Glancelove, Winkchat, and Golden Cup. The apps were downloaded from the Google Store.
This story "IDF Launches Campaign Against Hamas Catfishing Apps" was written by JTA.