All cases

APT-C-23 / Gaza Cybergang Operations

2018 – 2022 (ongoing, landmark incidents)

EspionagePeak: IntrusionAttribution: Moderate ConfidenceGovernmentDefense
Year
2020
Actor country
Palestinian Territories (Hamas-linked)
Target regions
Israel, Palestinian Territories, Egypt
Unpeace score
5

Executive Summary

Hamas-linked threat actor conducting espionage against Palestinian Authority officials, Israeli military and security personnel, and regional governments using sophisticated mobile malware and social engineering. Operations demonstrate that non-state armed groups in conflict zones have developed persistent cyber espionage capabilities comparable to some state programmes.

Why This Matters

Gaza Cybergang operations demonstrate that non-state armed groups can develop persistent cyber espionage capabilities, complicating the state-centric framework of international cyber norms and raising questions about accountability in asymmetric conflict.

Escalation Profile

7-Dimension Profile

Escalation Ladder

Probing
Intrusion
Disruption
Degradation
Destruction
Strategic

Phases

2018
Intrusion

Mobile espionage campaigns

Deployed custom Android spyware through fake messaging and dating applications targeting Israeli military personnel and Palestinian Authority officials.

2021
Intrusion

Evolved tradecraft

Updated mobile malware with improved evasion techniques; expanded targeting to include regional diplomatic targets in Egypt and Gulf states.

Threshold Crossings

  • Non-state armed group maintaining a persistent, multi-year cyber espionage programme
  • Targeting of an occupying military's personnel through social engineering at scale

Restraint Factors

  • Operations remained focused on intelligence collection, not disruption
  • Mobile malware designed for stealth and persistence rather than destruction

Attribution Assessment

Moderate ConfidenceAPT-C-23 / Gaza Cybergang / Arid Viper, assessed by multiple security vendors to be linked to Hamas
Palestinian Territories (Hamas-linked)
APT-C-23Arid ViperDesert FalconGaza Cybergang
1. Technical

Threat actor mapped to Palestinian Territories (Hamas-linked) based on infrastructure analysis, malware attribution, and operational patterns.

Evidence: ESET: APT-C-23 targets Middle Eastern users with fake messaging apps; Check Point: Gaza Cybergang Threat Intelligence Report

2. Political / Legal
No formal state response
  • Israeli security services reported disruption of some campaigns
  • Google and Apple removed malicious applications from app stores upon vendor notification
3. Open Source

No dedicated journalistic sources in dataset. See sources section for full references.

Moderate Confidence” reflects available public evidence. All assessments carry inherent uncertainty and should be read alongside source material.

Unpeace Position

5

Unpeace Score

Composite severity rating on the peace–conflict spectrum

Stable
Contested
Escalatory
03060100

Contributing Dimensions

Escalation peak2/6
Threshold crossings2/4
Governance flags1/8
Sectors affected2/6
Entanglement6/10
Country scope3/6

Coercive Function

Espionage

Intelligence collection — coercive value lies in the information advantage gained and the implicit signal that the adversary can access sensitive systems.

Observed coercive effects

  • Non-state armed group maintaining a persistent, multi-year cyber espionage programme
  • Targeting of an occupying military's personnel through social engineering at scale

Entanglement Risk

Entanglement score6

Sectors affected

GovernmentDefense

Countries / regions

IsraelPalestinian TerritoriesEgypt

Impact summary

Sustained espionage against Israeli military personnel and PA officials; intelligence value of exfiltrated data unknown.

Infrastructure Meaning

Malware / tooling

GnatSpyViper RATBarbWire

Capability profile

Sustained espionage against Israeli military personnel and PA officials; intelligence value of exfiltrated data unknown.

3 ATT&CK techniques mapped — see ATT&CK mapping below.

Governance Analysis

Governance Flags

!Norm Violation
APublic Attribution
SSanctions Imposed
IIndictment
UUN Discussion
RRegulatory Change
CInternational Cooperation
DDeterrence Signal

Norms invoked

  • Application of cyber norms to non-state armed groups in conflict zones
  • Dual-use mobile surveillance capabilities

Policy responses

  • Israeli security services reported disruption of some campaigns
  • Google and Apple removed malicious applications from app stores upon vendor notification

Regulatory changes

  • Informed Israeli military mobile device security policies

Governance impact assessment

Demonstrated that non-state armed groups in protracted conflict zones can develop and sustain cyber espionage capabilities, challenging the state-centric framing of most international cyber norm discussions.

Sources

V

ESET: APT-C-23 targets Middle Eastern users with fake messaging apps

Vendor Report2022-04
V

Check Point: Gaza Cybergang Threat Intelligence Report

Vendor Report2021-02

Sources listed reflect publicly available materials used to construct this case entry. Inclusion does not imply endorsement. Where no URL is provided, the source may be found via its title and date.