As you can imagine, more people are reading The Jerusalem Post than ever before. Nevertheless, traditional business models are no longer sustainable and high-quality publications, like ours, are being forced to look for new ways to keep going. Unlike many other news organizations, we have not put up a paywall. We want to keep our journalism open and accessible and be able to keep providing you with news and analyses from the frontlines of Israel, the Middle East and the Jewish World.
As one of our loyal readers, we ask you to be our partner.
For $5 a month you will receive access to the following:
- A user uxperience almost completely free of ads
- Access to our Premium Section and our monthly magazine to learn Hebrew, Ivrit
- Content from the award-winning Jerusalem Repor
- A brand new ePaper featuring the daily newspaper as it appears in print in Israel
Help us grow and continue telling Israel’s story to the world.
Ronit Hasin-Hochman, CEO, Jerusalem Post Group
Yaakov Katz, Editor-in-Chief
The IDF has uncovered another Hamas network posing as attractive young women and men on social networks in order to lure in IDF soldiers in order to access as much information and intelligence on the army that they can.
In January, a year after the Israeli Army first uncovered Hamas attempts to honeypot male soldiers online, military intelligence began receiving new reports from soldiers of suspicious online activities.
A new Military Intelligence operation dubbed “HeartBreaker” was launched in March to uncover the cell behind the suspicious online actions targeting IDF soldiers.
“We know who is behind this,” said one senior military intelligence official who stated that while the damage done was minor “there was of course, a potential of serious harm to national security.”
The Hamas applications had “wide capabilities,” a senior military intelligence officer said, adding that the Hamas network was more believable than the previous attempt despite still writing in Hebrew with visible spelling and grammatical errors.
According to senior intelligence officials, soldiers had been approached by suspicious figures on social networks as well as on messenger applications such as Whatsapp using Israeli numbers to get soldiers to download applications from Google’s official store.
An investigation by the IDF’s Military Intelligence found that the 11 suspicious individuals (three who approached soldiers on WhatsApp, another eight approached soldiers on Facebook) were an intelligence network of the Hamas terrorist organization which asked the soldiers to download applications which compromised their cell phones with Trojan horse viruses.
The applications used by Hamas included two social networking applications, WinkChat, and GlanceLove, and an application for fans of the World Cup-GoldenCup. All applications had between 400 to 500 downloads before being removed from the Google App store.
But a quick search online show both GlanceLove and WinkChat are still available to download and a Facebook page for GoldenCup remains open.
“WinkChat is an app that lets you poke everyone, anywhere whom [is] in your friends list and to be in contact with them in a romantic way, also it refreshes friends relations and builds new relations with any person you like,” reads the description of the application on the APKPure store.
Once on the phone, the virus would give Hamas operatives access to all pictures, the soldier’s location, text messages (including the history of sent messages), and the soldier’s contact list. The virus would also be able to download files, access the phone’s camera and microphone, take pictures and record conversations remotely, without the soldier knowing.
Nevertheless, most of the soldiers who were approached by the Hamas operatives demonstrated a high awareness of the IDF’s information security directives and acted in accordance to the guidelines. The soldiers did not cooperate with the suspicious individuals, instead they informed their commanders who reported the attempts to military intelligence.
According to the senior intelligence officer, while both male and female soldiers were approached, sometimes in romantic ways, the female soldiers would cut off communication faster than their male counterparts.
Military Intelligence has reiterated to soldiers to follow the IDF’s caution guidelines for the use of social networks by soldiers: only confirming friendship requests from people one knows personally, to not upload any classified information to any social network, and to only download applications from the original App Store (rather than downloading applications from links).
The military has also recommended that if a soldier is approached by a stranger online, be aware that it might be an attempt to honeypot them, especially if the suspicious individual is unable to meet in person.
The IDF has urged all soldiers, including reserve soldiers, to report to their commander and security officials if the suspicious individual asks them to download applications and if they feel that their phone may have been compromised.
Click here to open external link
Heartbroken over Hamas: IDF intel uncovers more Hamas honeypots