Hamas’ online terrorism

Interesting, have only copied in extracts, each article at each link is not too long however.

Viral social media

Hamas’ online terrorism



The Information Security Department just revealed Hamas’ method of operation on the internet. In response, the IDF has launched Operation Broken Heart. Hamas cyber terrorists operate as stolen identities in order to talk to people, get their personal information, retrieve sensitive security information, and download malicious applications that turn cell phones into weapons. Thanks to IDF soldiers’ vigilance, there was no damage to Israel’s security.


Hamas’s new espionage system exposed

Hamas plot to upload applications to official Google store to make soldiers download spyware uncovered by alert soldiers.



As of January 2018, the Department of Information Security has begun to receive requests from dozens of soldiers who claim to have encountered suspicious individuals on social media who tried to make them download applications from the official Google app store. Following the soldiers’ reports, the Information Security Department opened an investigation. The investigation revealed that the network was an intelligence operation of the Hamas terrorist organization. The applications included a World Cup app as well as two dating apps.

Explore posts in the same categories: Uncategorized

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s