Hamas: Members of Hamas have created fake dating applications to target members of the Israel Defense Force (IDF). Researchers at Check Point have found at least three dating applications that were being used by the threat actors. GrizyApp, ZatuApp, and Catch&See were the three fake applications that soldiers were encouraged to download after receiving private messages on Facebook, Twitter, and WhatsApp. After victims installed any of the applications, an error message would display stating that the application was not supported and would be deleted. This would cause the victim to believe that the installation had failed, but in reality, the malware was up and running in the background. The malware would register as a device administrator and request permission to access the camera, calendar, location, SMS data, contact list, and browser history. The malware also has the ability to extend its code by downloading and executing remote .dex files. Once the .dex file is executed, it automatically receives the permission of the parent application. The malware essentially had the ability to access anything on the device, including sensitive military information that may be stored by the user or visible to the camera.
With all the news around COVID-19/Coronavirus, the average person is turning to the internet for