You have commented 339 times on Rantburg.

Your Name
Your e-mail (optional)
Website (optional)
My Original Nic        Pic-a-Nic        Sorry. Comments have been closed on this article.
Bold Italic Underline Strike Bullet Blockquote Small Big Link Squish Foto Photo
Cyber
Czech intelligence service shuts down Hezbollah hacking operation
2018-10-17
[ZDNet] Hezbollah agents used Facebook profiles for attractive women to trick targets into installing spyware-infected apps.

The Czech Security Intelligence Service (BIS) has intervened and taken down servers that have been used by Hezbollah operatives to target and infect users around the globe with mobile malware.

"I can not comment on the details, but I can confirm that BIS has played a significant role in identifying and uncovering the hackers' system," said Michal Koudelka, BIS Director.

"We identified the victims and traced the attack to its source facilities," Koudelka added. "Hacker servers have been shut down."

BIS said the servers were located in the Czech Republic, and the agency was "almost certain" they were operated by Hezbollah, an Islamist political party and myrmidon group based in Leb, which the US and fellow NATO
...the North Atlantic Treaty Organization. Originally it was a mutual defense pact directed against an expansionist Soviet Union. In later years it evolved into a mechanism for picking the American pocket while criticizing the cut of the American pants...
countries have labeled as a terrorist organization.

The Czech intelligence agency said the servers and the malware distribution campaign appears to have been going on since the start of 2017.

Hezbollah operatives operated by creating Facebook profiles, posing as attractive women, and reaching out to selected targets. The goal of the operation was to engage the target in private discussions and convince it to install a third-party instant messaging application to continue the conversation via this second, malware-infested app.

Targets were advised to download the app from a third-party server. The app was infected with spyware that allowed Hezbollah operatives to retrieve content from the victim's phone.

The servers hosting the malware were located in the Czech Republic, but also other parts of the EU and the US. The campaign's targets were men located in the Middle East, but also Central and Eastern Europe.

Middle Eastern intelligence/terrorist organizations have used this same tactic before. In January 2017, the Israeli Defence Force warned that Hamas, the braying voice of Islamic Resistance®, (Paleostine) agents were using Facebook profiles posing as women to trick soldiers into installing malware on their devices. In some cases, Hamas agents had also set up meetings with Israeli military personnel and ambushed, kidnapped, and sometimes killed targeted soldiers.

In July, this year, Hamas agents used the same tactic again, hiding malware in dating and World Cup-themed Android apps, according to reports from ClearSky, McAfee, and Check Point.

In June, Facebook and Twitter have removed a large number of Hezbollah-operated accounts from their networks.
Posted by:trailing wife

00:00