Skip to main content

Archived Article — The Daily Perspective is no longer active. This article was published on 6 March 2026 and is preserved as part of the archive. Read the farewell | Browse archive

Technology

Hamas hackers weaponise Israeli alert app in latest spy campaign

Spyware disguised as emergency warning targets civilians amid escalating cyber-physical threats

Hamas hackers weaponise Israeli alert app in latest spy campaign
Image: The Register
Key Points 3 min read
  • Hamas-linked Arid Viper group sent spoofed SMS messages impersonating Israel's official emergency alert service, redirecting users to malicious apps
  • The trojanised application steals SMS messages, contact lists, and real-time GPS location data from infected devices
  • Researchers say the campaign reflects a troubling trend: wartime conflicts increasingly blur cyber operations with military operations
  • Affected users should immediately isolate devices, revoke admin rights, and perform factory resets to remove the malware

Security researchers have uncovered a spyware campaign linked to Arid Viper, a Hamas-aligned cyberespionage group active since at least 2013.The attack used SMS messages impersonating Israel's official 'Oref Alert' rocket warning service, distributed from spoofed sender IDs and urging recipients to install an updated version of the emergency-alert app.

At the moment there is no way to know for sure what the scope or size is, or how many infections were successful, according to threat researchers at Acronis Threat Research Unit.The campaign appears broadly indiscriminate; the Israeli National Cyber Directorate and major Israeli news sites have since released warnings about the phishing attack, which further supports the theory that this is broadly indiscriminate.

The attack method reveals how easily trust in critical infrastructure can be weaponised during periods of heightened tension. Rather than directing victims to legitimate app stores,threat actors capitalised on the desperate need for real-time rocket alerts by distributing a trojanised version of the official Home Front Command application through targeted SMS phishing. The spoofed messages included shortened links that bypassed Google Play's security checks by compelling users to sideload the malicious app directly.

Once installed, the implications are severe.The malware allows operators to create phishing overlays on top of other applications on the phone, enabling attackers to intercept one-time passwords, credentials, and account numbers; the spying app maintains persistence by automatically starting after device reboot; all stolen data is staged locally and then continuously transmitted to attacker remote command-and-control servers.

The campaign exposes a fundamental tension in modern conflict.Periods of military escalation in the region are consistently accompanied by a rise in cyber operations; attackers frequently leverage wartime themes such as emergency alerts, missile warnings, or security updates as social engineering lures to distribute surveillance malware and collect sensitive information. This is not unique to the current situation. The intersection of kinetic and cyber warfare has become normalised in regional conflicts, with attackers systematically exploiting the psychological urgency of real threats.

The broader concern extends beyond espionage.The operation threatens public trust; by hijacking the branding of a critical emergency application, the campaign risks undermining confidence in official alert systems at a time when civilians depend on them most. When citizens cannot trust emergency notifications, the damage extends beyond stolen data into public confidence in government institutions.

Yet there is a counterargument worth taking seriously. Critics of heavy-handed cybersecurity responses point out that absolute security is impossible; every defensive measure creates friction that may deter legitimate users from adopting necessary tools. The perfect should not become the enemy of the good. Emergency alert systems serve a vital public safety function, and overly restrictive authentication measures could compromise their effectiveness when lives depend on rapid notifications.

For those already infected,security teams recommend immediate device isolation, revocation of administrative privileges and, in most cases, a full factory reset to remove the malware.Analysts urge users to verify apps only through trusted app stores, refrain from sideloading emergency updates via links, and deploy mobile threat defence systems capable of detecting reflective and proxy-based code injections.

The reality is that this campaign reflects a mature threat landscape. Arid Viper's sophistication has grown over more than a decade; the group demonstrates consistent technical innovation and operational patience. The decision to exploit emergency alert systems shows calculation, not desperation. Australian organisations working in the region or managing clients with Israeli contacts should assume similar targeting is possible and ensure staff understand the mechanics of SMS spoofing and application sideloading.

What remains clear is this: in an era where military operations increasingly run alongside cyber operations, the distinction between military targets and civilian infrastructure has become blurred by design. Governments, security vendors, and citizens must balance legitimate security hardening against the need to maintain functional public communication systems. Neither absolute openness nor absolute lockdown is practical. The pragmatic middle ground requires user education, technical detection capabilities, and rapid incident response. It requires investment in baseline security without paralyzing the systems people depend on.

Sources (5)
Zara Mitchell
Zara Mitchell

Zara Mitchell is an AI editorial persona created by The Daily Perspective. Covering global cyber threats, data breaches, and digital privacy issues with technical authority and accessible writing. As an AI persona, articles are generated using artificial intelligence with editorial quality controls.