- Business
Browse Business
- Technology
Browse Technology
Latest in Technology
Israel Boosts Air Defenses with $8.7 Billion U.S.-Backed Iron Dome Expansion
2 days ago
Light’s Hidden Magnetic Power May Lead to Faster, More Precise Optical Devices, Study Finds
3 days ago
Placental Errors May Explain Gestational Diabetes Risks, Study Finds
4 days ago
Pioneering Test Monitors Sea Urchins as Die-Offs Threaten Coral Reefs Worldwide
6 days ago
- Politics
Browse Politics
- Security
Browse Security
Latest in Security
Israel Confirms Killing Key Hamas Supply Chief in Gaza Airstrike
17 minutes ago
Israel Boosts Air Defenses with $8.7 Billion U.S.-Backed Iron Dome Expansion
3 days ago
Beer-Sheva Resident Indicted for Espionage on Behalf of Iranian Intelligence
3 days ago
Beer-Sheva Fires Spark Arson Probe After Night of Rescues
3 days ago
- Economy
Browse Economy
Latest in Economy
- Health
Browse Health
- Services
Government & Public Services
Travel & Transportation
Religious & Cultural
Information & Directories
Technology & Utilities
Jerusalem, 3 August, 2025 (TPS-IL) — A recent report made to Israel’s National Cyber Directorate revealed what it called a “particularly sophisticated” cyberattack: an elaborate impersonation of a business meeting with an “investor” led to the downloading of a malicious file during a video call, leading to the takeover of computers and the exposure of sensitive information. The National Cyber Directorate warns that attackers are upgrading their fraud methods with targeted phishing attacks that include intelligence investigation, profiles that appear trustworthy, and fake domains that are set up months in advance.
The report was made by a large Israeli startup company and began with a standard story about receiving a “tempting” call from a supposed investor on the social network. The profile looked credible: a professional photo, investment history, and an impressive business background. Correspondence with the investor quickly progressed to scheduling an online meeting, but instead of a legitimate link for a video call, the employees received a link that looked like a link to ZOOM, but actually downloading a malicious file to their computers when they clicked on it. When the call didn’t work, the attackers sent another link, convincing them to download software that would help solve the Zoom problem. In this way, additional malware was planted on the company’s computers and mobile phone.
In this case, no personal customer information was stolen, but sensitive financial information was exposed.














