The Israel Defense Forces (IDF) spokesman revealed today, Sunday, that the Israeli army and the Shin Bet security service launched a joint operation to foil an operation by the Islamic Resistance Movement (Hamas) that targeted Israeli soldiers for several months.

The military spokesman explained that Hamas penetrated the phones through three applications that transmit information from the phones, including the camera and the operation of the recorder on the phones.

And the American security information company "Check Point" completed a report on Hamas's hacking capabilities, along with a technical analysis of the malware used in the operation.

Mart software
Mart software is a Trojan (Trojan fortress) software that can be hidden in a range of applications. Hamas has used the following dating apps "Grixy", "Zatu" and "Catch & See", through websites dedicated to dating applications.

These applications were transmitted through social media conversations held by fake Hamas figures with Israeli soldiers and officers, and persuaded them to continue communicating through these specific applications, according to the channel.

According to the report, the victim received a link to download the harmful application from a member of Hamas who denies the application of dating as an attractive woman.

Once the application is installed and running, it displays an error message stating that the device does not support the application, and that the application will uninstall itself, which does not happen, as the application only hides the icon while it continues to work at the back without the user noticing.

The report explains that the malware, while in hiding, is connected to Hamas servers via the "mqtt" protocol.

The malicious program is dangerous in its ability to collect victim-related data, such as phone number, location, text messages, etc., while having the ability to develop its programming ability through remote commands, so that the phone receives a link and converts it into a file with a ".dex" extension (.dex), The application downloads and activates it.

An error message stating that the device does not support the application, and that the application will uninstall itself (Check Point)

Phishing suspicious sites
Hamas has created sites similar to dating application sites, and has used its technical capabilities to build phishing sites similar to the real dating dating sites used, according to the same report.

These sites offer a direct link to download the applications. The victim cannot distinguish between these real sites and sites, as Hamas uses the names of actors, TV personalities, and celebrities to deceive Israeli soldiers.

Initially, the imaginary figures presented themselves to the soldiers and officers through the means of communication, including "Telegram", as deaf or hard of hearing, and thus managed to conduct a dialogue without raising suspicions of the lack of a voice conversation, according to the same source.

The characters who claimed to be residing outside Israel sent messages with general female voices to increase confidence in the Israeli soldiers. It also used Israeli tags to create confidence, and made adjustments to its default images so that they are not exposed when searching on the Internet, along with the use of colloquial (Hebrew) language and a number of Israeli platforms.

In its report, the American company added that the discussion is about a breakthrough, the third of its kind by Hamas in three and a half years.

A Hamas spokesman told Anadolu that the war of minds continues between resistance and occupation in the context of a full confrontation with him.

Hazem Qassem stressed that the intelligence mind of the resistance demonstrated its ability to confront the occupation security services, which was embodied in previous battles.