Mobile spyware campaign impersonates Israel's Red Alert rocket warning system
A targeted campaign has been identified distributing a trojanized version of the Red Alert rocket warning Android app to Israeli users via SMS messages impersonating official Home Front Command communications. The malicious app retains full rocket alert functionality while running malicious code in the background. It bypasses Android security checks through certificate spoofing and runtime manipulation. Once installed, the malware collects sensitive data including SMS messages, contacts, location data, device accounts, and installed applications. The stolen data is transmitted to a remote command-and-control server. This campaign exploits user trust in emergency services during periods of geopolitical tension, combining social engineering with mobile espionage for maximum impact.
AI Analysis
Technical Summary
This threat involves a sophisticated mobile spyware campaign targeting Israeli Android users by distributing a trojanized version of the Red Alert rocket warning app, which is a critical emergency notification tool used by Israel's Home Front Command. The attackers send SMS messages impersonating official communications to trick users into installing the malicious app. The trojanized app retains full legitimate functionality to avoid suspicion but runs malicious background code to harvest sensitive information including SMS messages, contacts, geolocation data, device accounts, and installed applications. The malware evades Android security checks through certificate spoofing—faking the app's digital signature—and runtime manipulation techniques that bypass integrity verification. Collected data is exfiltrated to a remote command-and-control server hosted on domains such as ra-backup.com. This campaign leverages social engineering by exploiting the high trust users place in emergency alert systems, especially during periods of heightened geopolitical tension. The adversary identified is Arid Viper, known for targeted espionage. Although no CVE or known exploits in the wild are reported, the campaign's targeted nature and stealthy data collection pose significant privacy and security risks to affected users. Indicators of compromise include specific file hashes and C2 domains. The attack highlights the risk of supply chain and app impersonation attacks on mobile platforms, particularly in sensitive geopolitical contexts.
Potential Impact
The impact of this spyware campaign is significant for Israeli individuals and organizations relying on the Red Alert app for life-saving rocket alerts. By compromising this trusted app, attackers gain access to a wealth of sensitive personal and device data, including communications, contacts, location, and device accounts, enabling extensive espionage and surveillance. This can lead to privacy violations, intelligence gathering, and potential targeting of individuals or groups. The malware’s ability to bypass Android security checks increases the likelihood of successful infection and persistence. Organizations with employees in Israel or those supporting Israeli operations may face indirect risks from compromised devices. The campaign undermines trust in critical emergency communication infrastructure, potentially causing users to hesitate in installing legitimate updates or apps. While currently focused on Israel, the techniques used could be adapted to other regions or apps, posing broader risks to mobile security and privacy worldwide.
Mitigation Recommendations
To mitigate this threat, organizations and users should: 1) Only install apps from official app stores and verify app signatures carefully, especially for critical emergency apps; 2) Educate users about phishing SMS and social engineering tactics impersonating official entities, emphasizing caution with unsolicited links or app installations; 3) Employ mobile threat defense solutions capable of detecting certificate spoofing and runtime manipulation behaviors; 4) Monitor network traffic for communications to suspicious domains such as ra-backup.com and block them at network perimeters; 5) Implement mobile device management (MDM) policies enforcing app integrity checks and restricting installation of apps from unknown sources; 6) Encourage regular device and app updates to patch vulnerabilities; 7) Conduct threat hunting for indicators of compromise including the provided file hashes; 8) Collaborate with local cybersecurity authorities to share intelligence and receive timely alerts; 9) For critical personnel, consider using hardened or dedicated devices for emergency apps to reduce exposure; 10) Promote awareness campaigns during periods of geopolitical tension to reduce susceptibility to social engineering.
Affected Countries
Israel
Indicators of Compromise
- hash: 9c6c67344fecd8ff8dbbee877aad7efc
- hash: 04ee8594b5101505b92e14777466a62a2f4a2ceb
- hash: 83651b0589665b112687f0858bfe2832ca317ba75e700c91ac34025ee6578b72
- url: https://api.ra-backup.com/analytics/submit.php
- url: https://api.ra-backup.com/analytics/submit.php.
- domain: ra-backup.com
- domain: api.ra-backup.com
Mobile spyware campaign impersonates Israel's Red Alert rocket warning system
Description
A targeted campaign has been identified distributing a trojanized version of the Red Alert rocket warning Android app to Israeli users via SMS messages impersonating official Home Front Command communications. The malicious app retains full rocket alert functionality while running malicious code in the background. It bypasses Android security checks through certificate spoofing and runtime manipulation. Once installed, the malware collects sensitive data including SMS messages, contacts, location data, device accounts, and installed applications. The stolen data is transmitted to a remote command-and-control server. This campaign exploits user trust in emergency services during periods of geopolitical tension, combining social engineering with mobile espionage for maximum impact.
AI-Powered Analysis
Technical Analysis
This threat involves a sophisticated mobile spyware campaign targeting Israeli Android users by distributing a trojanized version of the Red Alert rocket warning app, which is a critical emergency notification tool used by Israel's Home Front Command. The attackers send SMS messages impersonating official communications to trick users into installing the malicious app. The trojanized app retains full legitimate functionality to avoid suspicion but runs malicious background code to harvest sensitive information including SMS messages, contacts, geolocation data, device accounts, and installed applications. The malware evades Android security checks through certificate spoofing—faking the app's digital signature—and runtime manipulation techniques that bypass integrity verification. Collected data is exfiltrated to a remote command-and-control server hosted on domains such as ra-backup.com. This campaign leverages social engineering by exploiting the high trust users place in emergency alert systems, especially during periods of heightened geopolitical tension. The adversary identified is Arid Viper, known for targeted espionage. Although no CVE or known exploits in the wild are reported, the campaign's targeted nature and stealthy data collection pose significant privacy and security risks to affected users. Indicators of compromise include specific file hashes and C2 domains. The attack highlights the risk of supply chain and app impersonation attacks on mobile platforms, particularly in sensitive geopolitical contexts.
Potential Impact
The impact of this spyware campaign is significant for Israeli individuals and organizations relying on the Red Alert app for life-saving rocket alerts. By compromising this trusted app, attackers gain access to a wealth of sensitive personal and device data, including communications, contacts, location, and device accounts, enabling extensive espionage and surveillance. This can lead to privacy violations, intelligence gathering, and potential targeting of individuals or groups. The malware’s ability to bypass Android security checks increases the likelihood of successful infection and persistence. Organizations with employees in Israel or those supporting Israeli operations may face indirect risks from compromised devices. The campaign undermines trust in critical emergency communication infrastructure, potentially causing users to hesitate in installing legitimate updates or apps. While currently focused on Israel, the techniques used could be adapted to other regions or apps, posing broader risks to mobile security and privacy worldwide.
Mitigation Recommendations
To mitigate this threat, organizations and users should: 1) Only install apps from official app stores and verify app signatures carefully, especially for critical emergency apps; 2) Educate users about phishing SMS and social engineering tactics impersonating official entities, emphasizing caution with unsolicited links or app installations; 3) Employ mobile threat defense solutions capable of detecting certificate spoofing and runtime manipulation behaviors; 4) Monitor network traffic for communications to suspicious domains such as ra-backup.com and block them at network perimeters; 5) Implement mobile device management (MDM) policies enforcing app integrity checks and restricting installation of apps from unknown sources; 6) Encourage regular device and app updates to patch vulnerabilities; 7) Conduct threat hunting for indicators of compromise including the provided file hashes; 8) Collaborate with local cybersecurity authorities to share intelligence and receive timely alerts; 9) For critical personnel, consider using hardened or dedicated devices for emergency apps to reduce exposure; 10) Promote awareness campaigns during periods of geopolitical tension to reduce susceptibility to social engineering.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.acronis.com/en/tru/posts/mobile-spyware-campaign-impersonates-israels-red-alert-rocket-warning-system/"]
- Adversary
- Arid Viper
- Pulse Id
- 69aaf10c4b4f536d9d767c85
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash9c6c67344fecd8ff8dbbee877aad7efc | — | |
hash04ee8594b5101505b92e14777466a62a2f4a2ceb | — | |
hash83651b0589665b112687f0858bfe2832ca317ba75e700c91ac34025ee6578b72 | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttps://api.ra-backup.com/analytics/submit.php | — | |
urlhttps://api.ra-backup.com/analytics/submit.php. | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainra-backup.com | — | |
domainapi.ra-backup.com | — |
Threat ID: 69ae9f3e2904315ca3f7e27c
Added to database: 3/9/2026, 10:21:50 AM
Last enriched: 3/9/2026, 10:37:24 AM
Last updated: 3/13/2026, 9:47:01 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.