Everyday thousands of children are being sexually abused. You can stop the abuse of at least one child by simply praying. You can possibly stop the abuse of thousands of children by forwarding the link in First Time Visitor? by email, Twitter or Facebook to every Christian you know. Save a child or lots of children!!!! Do Something, please!

3:15 PM prayer in brief:
Pray for God to stop 1 child from being molested today.
Pray for God to stop 1 child molestation happening now.
Pray for God to rescue 1 child from sexual slavery.
Pray for God to save 1 girl from genital circumcision.
Pray for God to stop 1 girl from becoming a child-bride.
If you have the faith pray for 100 children rather than one.
Give Thanks. There is more to this prayer here

Please note: All my writings and comments appear in bold italics in this colour

Tuesday, 19 December 2023

Iran's Spectacular Hypocrisy > Luring IDF Soldiers with half naked Iranian girls; Hamas uses girls to lure IDF into downloading spyware

 

Iran-based women send IDF soldiers explicit photos

in attempted honey trap


The young women were trained by the Islamic Revolution Guards Corps (IRGC), were fluent in Hebrew, and contacted the soldiers, sending them explicit videos and photos to gain information.


Photo of a Hamas honeypot photo, identified as Noa D.
(photo credit: IDF SPOKESPERSON'S UNIT)

Iranian hierarchy has revealed itself to be complete fakes when it comes to righteousness. Their Morality police arrest, rape, torture, and imprison young women for revealing a wisp of hair from under their hijabs. Some have even been murdered. And yet, the Iran Revolutionary Guard encourage attractive young Hebrew speaking girls to expose much more than their hair to IDF soldiers in Israel.

Have you ever heard of anything more hypocritical?

Please go to The Jerusalem Post for more on this story.

========================================================================


IDF foils another Hamas honeypot attempt


The fake accounts that were identified as Hamas operators were seemingly innocent profiles that approached Israelis over the past month, attempting to implant spyware.

By ANNA AHRONHEIM

Updated: JULY 4, 2022 14:18



The IDF has uncovered and foiled yet another Hamas network posing as young women on social networks in order to honeypot IDF soldiers in order to access as much information and intelligence on the military that they can.

The fake accounts that were identified as Hamas operators were Hodaya Shetrit, Racheli Benisti and Adina Goldberg.

The seemingly innocent profiles approached Israelis over the past month on Telegram and various social networks that dealt with soccer and dating and tried to implant spyware under the guise of a puzzle app.


"The profiles corresponded with soldiers in order to establish a connection that would allow them to take the next step and entice them to download a game, which would later turn out to be a malicious attack tool," a senior officer in Military Intelligence was quoted by the IDF as saying.



"The profiles corresponded with soldiers in order to establish a connection that would allow them to take the next step and entice them to download a game, which would later turn out to be a malicious attack tool."

Senior Israeli military officer



The app would allow the attacker, Hamas, to gain almost complete control over the soldier’s device. It would then be used to gather critical information and even track the soldier.


The network was identified after a soldier reported a suspicious conversation that he had with someone on Telegram. 

What happens now?

Following the report, an operation dubbed “The end of the Game” was begun by a joint team made up of the Shin Bet internal security agency, the IDF's Information Security Division and the Spectrum and Cyber Defense Division. 

The operation by the various bodies was conducted in the General Staff monitoring center that was recently opened in the Information Security Division which is responsible for detecting, identifying and exposing various cyber threats against soldiers and military assets using advanced technological means.

“This is comprehensive cooperation of a number of security bodies inside and outside the military, through which many attempts to penetrate soldiers' phones were thwarted, without them noticing,” the IDF said.

The Israeli military has thwarted several similar attempts by Hamas to honeypot troops in recent years.

Two years ago, the phones of hundreds of soldiers, including combat soldiers, were compromised. The IDF thwarted the attempt by the Gaza-based terror group in an operation they called “Rebound.”

In that attempt, Hamas was said to have improved their attack plan and used new platforms like Telegram alongside platforms such as Instagram, Facebook and WhatsApp. The group also sent voice messages in an attempt to make the enemy account sound more believable.

The military identified six main characters used by Hamas, many of whom presented themselves as new immigrants to Israel with hearing or vision problems to explain their less-than-fluent Hebrew.

In addition to using the same characters on various platforms to boost its credibility, Hamas is said to have edited their pictures, making it more difficult to find the original source of the character's picture.

How did the virus help Hamas?

Once on the phone, the virus would give Hamas operatives control over all aspects of the phone, including pictures, the soldier’s location, text messages and the soldier’s contact list.

The virus would also have access to the phone’s camera and microphone, taking pictures and recording conversations remotely without the soldier knowing. The group was also able to download and transfer files and have access to the phone’s GPS allowing them to know the infected device’s location.

Is this a pattern?

The IDF believes that Hamas and other terror groups will continue with similar attempts.

 "We are closely monitoring the enemy, and as soon as we see fit, we will thwart it and impair its capabilities," the IDF said. "It should be understood that this is an ongoing mission, in which we will continue to act at all times to disrupt enemy capabilities.”

Following the latest attempt, the military has reiterated to soldiers to follow the IDF’s cautiousness guidelines for the use of social networks: only confirming friendship requests from people one knows personally, not uploading any classified information to any social network, and to only download applications from the original App Store (rather than downloading applications from links).

The military has also recommended that a soldier who is approached by a stranger online should be aware that it might be an attempt to honeypot them, especially if the suspicious individual is unable to meet in person. 

The IDF has urged all soldiers, including those in the reserves, to report to their commander and security officials if the suspicious individual asks them to download applications and if they feel that their phone may have been compromised.



No comments:

Post a Comment