Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Hamas hijacks dead hostages’ smartphones for cyber-strikes
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: Hamas hijacks dead hostages’ smartphones for cyber-strikes
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Israel ConflictMalwareNews

Hamas hijacks dead hostages’ smartphones for cyber-strikes

Editorial Team
October 20, 2023 at 12:28 PM
By Editorial Team Editorial Team
Share
Stolen terrorist smartphones used for cyber attacks
SHARE

Stolen terrorist smartphones used for cyber attacks

Terrorist group Hamas, which was responsible for the recent atrocities committed in Israel, is reported to be using the smartphones of dead and captured Israeli hostages as entry points to monitor Israeli citizens in preparation for forthcoming cyber-strikes on Israel.

“I’ve been invited to over 20 groups for providing humanitarian aid or aid in decrypting enemy messages. Most of these groups are monitored by Hamas. They are using the phones of the captives to enter these groups and to monitor them,” Michael Yehoshua, a Tel Aviv resident who works at cybersecurity vendor HolistiCyber, told London-based technology publication Tech Monitor.

“[Hamas] penetrated the groups because they have the phones of the kidnapped or dead…They also connect to the new groups that have been established for aid, and they gather intelligence through this,” added Yehoshua.

Hamas could execute devastating cyber-strikes

Monitoring Israeli citizens in this way could enable Hamas to execute cyber-attacks on Israeli soil from across the border or from many Muslim locations with potentially devastating consequences. By using off-the-shelf artificial intelligence, the terrorists could carry out a process called ‘social engineering’ to instantly build up a sufficiently detailed profile of a relative, friend, or colleague of the hostage or the deceased to engineer highly targeted ‘phishing’ emails, appearing to come from a trusted source. All the unsuspecting relative, colleague, or friend needs to do is open a single link or attachment to execute hidden malware prepared by Hamas.

In the case of private citizens, the damage would most likely be financial and not particularly damaging. However, in the case of a soldier or someone employed in the energy or water treatment sectors, the outcome could be devastating. For example, a cyber-strike on a water treatment facility in Israel could result in the kind of breach that recently almost poisoned much of Israel’s water supply, which was executed by Iran, a close ally of Hamas, and was fortunately thwarted in time.

It must be hoped that Israel’s cyber skills are sufficient to thwart the terrorists – as they have generally been so in the past. Knowledge of the stolen smartphones and their contents should enable Israel’s cyber defense forces to gather sufficient intelligence to anticipate incoming attacks from these sources.

TAGGED: cyber espionage, cyber terrorism, Cybersecurity, fake social media, geopolitics, hamas, israel conflict, malware, social engineering, tech monitor, war
Editorial Team November 6, 2023 October 20, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article Lloyd’s warns of a potential $3.5 trillion cyber-strike
Next Article The Daily Decrypt - One Minute Roundup Law Enforcement takes down RagnarLocker base  – October 20th
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsOne Minute RoundupOne Minute Roundup

EU Launches Free Railway Cybersecurity Courses – June 16th

The International Union of Railways is launching cybersecurity courses specifically for the transport industry. Developed by industry specialists, the CYRUS training program aims to address the growing need for cybersecurity awareness in the industry, particularly among non-technical staff.

June 16, 2025
NewsOne Minute RoundupOne Minute Roundup

Geopolitical Tensions are Changing the Cybersecurity Landscape – June 13th

Political tensions are prompting nations to re-strategize cybersecurity. Countries that once sought international cooperation and joint strategies are now prioritizing domestic cyber capacities and national interests as a result of geopolitical instabilities.

June 13, 2025
CryptocurrencyNewsNorth Korea

Bogus IT workers are defrauding US businesses

The US government has seized over $7.74 million in illegal funds, allegedly siphoned off by illegitimate North Korean Information Technology (IT) workers for the benefit of the North Korean government. The US Department of Justice (DOJ) has filed a civil forfeiture complaint alleging that the IT workers secured employment in the US illegally, racking up millions of dollars in cryptocurrency and bypassing US sanctions placed against North Korea. According to the US Federal Bureau of Investigation (FBI), the use of North Korean IT workers to defraud the US is now taking place on a massive scale.

June 13, 2025
NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?