Cyber expert: Preparation for Hezbollah beeper explosions likely took months

This type of operation is familiar in intelligence circles and requires significant cooperation from organizations involved in the manufacturing process.

(Illustrative) A pager device and a crowd in Lebanon near a site where Hezbollah members' pager devices were hacked. (photo credit: REUTERS, SCREENSHOT/X, SECTION 27A COPYRIGHT ACT, SHUTTERSTOCK)
(Illustrative) A pager device and a crowd in Lebanon near a site where Hezbollah members' pager devices were hacked.
(photo credit: REUTERS, SCREENSHOT/X, SECTION 27A COPYRIGHT ACT, SHUTTERSTOCK)

The mysterious pager explosions on Tuesday that wounded more than 3,600 people in Lebanon, mostly Hezbollah terrorists, were the result of extensive planning, according to an Israeli cyber expert. The operation involved embedding components within the beepers that could translate signals into ignition and detonation, he said.

“In the world of cyber, there’s a concept known as the supply chain,” said Oleg Brodt, director of research, development, and innovation at Ben-Gurion University of the Negev’s Cyber Labs.

“Many attacks occur by compromising the supply chain,” he told Maariv. “An electronic device, like a beeper, contains numerous components, and each one could be infected with malware. This malware could be designed to raise the device’s temperature, cause a malfunction, ignite it, or even trigger an explosion.”

This type of operation was familiar in intelligence circles and requires significant cooperation from organizations involved in the manufacturing process, Brodt said, adding that these groups ensure that the malicious components are embedded or replaced without being detected by quality control.

“In such cases, it’s essential to make the changes to the device without raising suspicion during the quality inspection,” he said.

Kill switch

One potential method used is a feature known in the cyber world as a “kill switch.” In this scenario, malicious software is designed to detonate the device at a specific time or in response to a particular message sent to the beeper.

“It’s possible to set up a nonstandard message – something unusual or even gibberish – broadcast to hundreds or thousands of devices at once, causing simultaneous ignition and explosion,” Brodt said. “The radio waves received by the device are translated into a unique message that triggers a chain of events leading to the explosion.”