CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new mobile espionage campaign, dubbed RedAlert, targets civilians during the Israel-Iran conflict by distributing a trojanized version of Israel's official Red Alert rocket warning app. The malicious app mimics the legitimate application, delivering real alerts while running a surveillance payload in the background. The malware aggressively requests high-risk permissions, including access to SMS messages, contacts, and precise GPS location data. It uses sophisticated anti-detection techniques to evade standard integrity checks and conceal secondary payloads. The campaign poses strategic and physical security risks, including the potential exposure of civilian shelter locations and the bypassing of two-factor authentication (2FA).

Timeline

  1. 03.03.2026 18:15 1 articles · 23h ago

    RedAlert Spyware Campaign Exploits Wartime Panic With Trojanized App

    A new mobile espionage campaign, dubbed RedAlert, targets civilians during the Israel-Iran conflict by distributing a trojanized version of Israel's official Red Alert rocket warning app. The malicious app mimics the legitimate application, delivering real alerts while running a surveillance payload in the background. The malware aggressively requests high-risk permissions, including access to SMS messages, contacts, and precise GPS location data. It uses sophisticated anti-detection techniques to evade standard integrity checks and conceal secondary payloads. The campaign poses strategic and physical security risks, including the potential exposure of civilian shelter locations and the bypassing of two-factor authentication (2FA).

    Show sources

Information Snippets

Similar Happenings

Iranian Cyber Threat Activity Against U.S. Critical Infrastructure and Kinetic Targeting

Iranian state-sponsored and affiliated cyber threat actors are escalating retaliatory campaigns following joint Israeli-US military strikes on February 28, 2026, with a new surge in exploitation attempts against internet-connected surveillance cameras across the Middle East. Check Point Research (CPR) attributes the campaign to Iran-linked infrastructure, targeting Hikvision and Dahua devices in Israel, Qatar, Bahrain, Kuwait, the UAE, Cyprus, and Lebanon. The activity aligns with Iran’s military doctrine of using compromised cameras for operational planning and battle damage assessment, mirroring tactics observed during the June 2025 Israel-Iran conflict. Over 150 hacktivist incidents—DDoS attacks, defacements, and unverified breach claims—were recorded within 48 hours of the strikes, while the UK’s NCSC and Google’s Threat Intelligence Group (GTIG) warn of imminent, aggressive cyber-attacks leveraging ransomware-as-a-smokescreen, destructive wipers, and multi-actor obfuscation. Prior to this surge, Iranian actors conducted long-term espionage and destructive campaigns, including the use of ‘wiper’ malware, spear-phishing against global embassies, and cyber-enabled kinetic targeting—such as maritime AIS reconnaissance to facilitate missile strikes. Groups like APT42, Subtle Snail (UNC1549), and Imperial Kitten deployed tailored malware (e.g., MINIBIKE, TAMECAT) to infiltrate telecommunications, aerospace, and defense sectors, while MuddyWater accessed live CCTV streams for real-time attack planning. U.S. agencies, including CISA, continue to urge critical infrastructure operators to implement multi-factor authentication, maintain offline backups, and report incidents promptly, as Iran’s tactics evolve to combine espionage, destructive attacks, and cyber-physical convergence.