Threat Actor Characterization
Islamic Resistance Movement
ID: 9916aac2f961e3d05be21e211d072bcaActor Network Graph
Open Network GraphMITRE ATT&CK®
Islamic Resistance Movement (Hamas) — militant-political organization with an established cyber apparatus conducting espionage, information operations, and occasional disruption against Israeli government, military, media, and civilian targets (2012–2025). TTPs prominently include social engineering of IDF personnel via Android 'dating' and sports apps, bespoke mobile RATs, and application-layer C2. Open sources also document Israel’s 2019 kinetic strike against a Hamas cyber facility following an attempted cyber operation.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566.002 | Spearphishing Link | TA0001 | |
| T1476 | Deliver Malicious App via Other Means | TA0027 |
|
| T1071 | Application Layer Protocol | TA0011 |
|
CLASSIFICATION: Unclassified / Open Source Intelligence (OSINT)
Category: Militant / Political organization (Cyber wing) – Origin: Palestinian Territories (Gaza/West Bank)
Executive Summary
Open sources since 2012 describe a Hamas-aligned cyber capability focused on espionage, data collection, and information operations against Israeli military and governmental targets, with occasional disruptive actions. Recurrent campaigns leveraged Android lure apps (dating/sports) to compromise Israel Defense Forces (IDF) personnel devices, install MRATs, and exfiltrate communications and location data. Technical reporting documents application-layer C2 (e.g., MQTT) and bespoke delivery infrastructure registered under commodity providers. In May 2019, Israel reportedly conducted a kinetic strike on a Hamas cyber facility following an attempted cyber operation, signaling escalatory risk at the cyber-to-kinetic threshold. The broader 2023–2025 war context saw amplification by allied/ideological hacktivists, complicating attribution and increasing noise. Overall confidence is medium-high based on converging vendor reports, mainstream media, and doctrinal analyses.
- Industries / Sectors: Military (IDF), government, media; opportunistic civilian spillover via lures and social platforms.
- Geography (Region): Primarily Israel; collection against targets in the Middle East noted by multiple vendors.
- Timeframe: Active reporting from ~2012 through 2025; major publicized waves in 2017–2018 and 2020; wartime surge in/after Oct 2023.
- Orientation / Motive: Strategic intelligence collection on Israeli military and state apparatus; propaganda/influence during conflict escalation.
- Typical tradecraft: Persona-driven social engineering; off-store Android app delivery; custom MRATs; application-layer C2; controlled leak/propaganda channels.
- INFERENCE: Elements of APT-C-23/Arid Viper/Gaza Cybergang have been assessed by some vendors as Hamas-linked; confidence medium given mixed attributions across years.
2020-02-16 — Check Point Research — “Hamas Android Malware On IDF Soldiers — This is How it Happened”
https://research.checkpoint.com/2020/hamas-android-malware-on-idf-soldiers-this-is-how-it-happened/