Israel used hacked phones of Iranian bodyguards to track senior leaders during June conflict

A new report has revealed how Israel managed to target senior Iranian leaders during the June conflict by exploiting a simple weakness — mobile phones carried by bodyguards and drivers.

Phones Became Israel’s Tracking Tool

According to officials, top political and military leaders avoided using cell phones themselves, knowing they could be traced. But their security teams, assistants, and drivers did not follow the same rules. Many of them carried personal phones and even used them for social media during the war.

This mistake gave Israel a powerful advantage. By hacking into those devices, Israeli intelligence was able to monitor the movements of some of Iran’s most senior officials and scientists. Officials explained that while leaders avoided direct exposure, the constant presence of armed escorts and staff with phones created digital trails that were easy to follow.

The reliance on phones by guards and aides turned out to be the biggest vulnerability. Despite Iran increasing security measures once it learned of possible attacks, the use of these devices still opened doors for Israel to locate and strike key figures.

Israel’s Decapitation Plan at Start of War

The report describes that Israel had prepared a strategy to weaken Iran’s leadership from the very beginning of the 12-day conflict, which started on June 13. The plan focused on striking top commanders and decision-makers before they could coordinate defenses after the surprise assault.

In one of the first operations, Israeli forces tracked a high-ranking commander. He had gathered senior staff for an emergency meeting. Soon after, the meeting place was bombed. The strike killed him and his team. Israeli defense officials said this was possible because they traced digital signals from the phones of people around him.

How Cyber Attacks on Industrial Control Systems Can Endanger Lives ?

The attacks were designed to destabilize Iran’s command structure at the outset of the war. Israeli sources admitted that the unusually large number of bodyguards and staff members surrounding top figures worked in their favor. Every phone in the vicinity provided another possible route for monitoring.

“Using so many guards is a weakness we could exploit,” one official said. Israel viewed the massive security presence not as a barrier, but as a digital footprint that revealed exact locations.

Mistakes Continued Despite New Rules

Iranian security teams received orders to stop using mobile phones near officials after the early strikes. They began relying on walkie-talkies, and only team leaders carried communication devices. Commanders instructed these leaders not to travel directly with high-profile figures.

The strict rules were not always followed. In one incident, a group of guards ignored the order. They kept using their cell phones. This mistake allowed Israel to trace a meeting of senior political leaders. But in that case, the strike missed the intended targets.

Kristi Noem fires FEMA’s 24 IT staff after massive cybersecurity breach

Israel fought the June war for nearly two weeks and launched heavy attacks on Iran’s leadership, nuclear scientists, missile program, and uranium enrichment sites. Israeli officials said the strikes were necessary to prevent Iran from advancing plans to harm their country.

The exposure of how the operation used phones shows that technology and human error play a crucial role in modern conflicts. Even with tight security, one simple oversight can lead to devastating results.

Renuka Bangale
Renuka Bangale
Renuka is a distinguished Chartered Accountant and a Certified Digital Threats Analyst from Riskpro, renowned for her expertise in cybersecurity. With a deep understanding of cybercrimes, malware, cyber warfare, and espionage, she has established herself as an authority in the field. Renuka combines her financial acumen with advanced knowledge of digital threats to provide unparalleled insights into the evolving landscape of information security. Her analytical prowess enables her to dissect complex cyber incidents, offering clarity on risks and mitigation strategies. As a key contributor to Newsinterpretation’s information security category, Renuka delivers authoritative articles that educate and inform readers about emerging threats and best practices.

TOP 10 TRENDING ON NEWSINTERPRETATION

Kristi Noem Accused of Rushing Millions to Florida Pier Near Rumored Lover’s Home

Homeland Security Secretary Kristi Noem faces serious questions. A...

Ian Calderon moves to address cost of living crisis in bid to succeed Gavin Newsom as governor

A Millennial Candidate Steps Forward Former California State Assembly Majority...

Harrods Issues Urgent Warning After Customer Data Stolen in IT Breach

Personal details exposed in breach at third-party system Luxury department...

Shock in royal drama world—Dormer rejects promotion of Ferguson series, gives pay to child abuse charities

Actress Refuses Promotion and Donates Salary Actress Natalie Dormer has...

Trump plays Amelia Earhart records declassification card while Epstein scandal shadows his every move

President Donald Trump has announced that he will declassify...

London in shock—Russia-linked hackers steal personal data of 8,000 children from nursery chain

A major cyberattack has hit nurseries across London, leaving...

Bernie Sanders warns AI push by Musk Zuckerberg and Altman focuses on wealth not public benefit

Senator Bernie Sanders Criticizes Tech Giants Over AI Push Senator...

FBI uncovers ‘terrorize ICE’ note, but Joshua Jahn’s family disputes anti-ICE narrative

On September 24, 2025, Joshua Jahn, a 29-year-old from...

Leaked emails expose Epstein’s $54M legal war chest — Dershowitz, Starr, Lefkowitz among defenders

Newly obtained private emails show the support and guidance...

Hackers tied to Rhysida gang demand 3.4 million ransom after Maryland Transit Administration breach

The Maryland Transit Administration (MTA) has been hit by...

Kristi Noem Accused of Rushing Millions to Florida Pier Near Rumored Lover’s Home

Homeland Security Secretary Kristi Noem faces serious questions. A...

Ian Calderon moves to address cost of living crisis in bid to succeed Gavin Newsom as governor

A Millennial Candidate Steps Forward Former California State Assembly Majority...

Harrods Issues Urgent Warning After Customer Data Stolen in IT Breach

Personal details exposed in breach at third-party system Luxury department...

Bernie Sanders warns AI push by Musk Zuckerberg and Altman focuses on wealth not public benefit

Senator Bernie Sanders Criticizes Tech Giants Over AI Push Senator...

Related Articles

Popular Categories

error: Content is protected !!