The SpearHead 360 is a van that can hack your iPhone or Android device five football fields away

With all of the recent talk about privacy, a company called WiSpear is selling a van that can hack your Apple iPhone or Android handset even if you are 500 meters (547 yards) away. The vehicle, named the SpearHead 360, is the brainchild of Tal Dilian, an Israeli who has made a name for himself in the surveillance industry. The SpearHead 360 uses 24 antennas to help it lock in potential devices to hack. Once that occurs, the system has four different methods to get the targeted handset to connect to its Wi-Fi interceptors in what is called a man-in-the-middle attack.

Besides allowing the operator of the vehicle to hack into your smartphone, the SpearHead 360 is equipped with four different kinds of malware to infect various operating systems including iOS and Android. Dilian also says he has access to a number of publicly unknown (or zero-days) iOS and Android vulnerabilities that leave a hole open for hackers to plant the aforementioned malware. And the van can be used to hack multiple devices running on the same or different OS, being used at the same location, all at the same time.

At a price of $3.5 million to $5 million, the SpearHead 360 is too expensive for local police departments. Accessories include a drone and a backpack (priced at $1.2 million) that can carry out the same attacks. The vehicle was recently displayed at the ISS World and Eurosatory conferences.

As you might imagine, staunch privacy defenders are aghast. What makes the van so lethal is that it uses exploits unknown to phone manufacturers, and two of the four Wi-Fi based man-in-the-middle attacks have never been disclosed. Considering that they are based on flaws in the Wi-Fi protocal, these attacks, at least for now, can not be defended against.

So far, Dilian has yet to sell a single van, but he expects to ring up two to four of them before the end of the year.



1. NarutoKage14

Posts: 1348; Member since: Aug 31, 2016

If he sells any it would be funny to hear that someone wrapped the van in a Faraday cage.

2. worldpeace

Posts: 3135; Member since: Apr 15, 2016

"five football fields" American football or European football? since the company is from Israel. ISS World and Eurosatory conferences also EU shows..

4. worldpeace

Posts: 3135; Member since: Apr 15, 2016

And why 480p video?

5. Alan01

Posts: 646; Member since: Mar 21, 2012

U.S. Football. Regards, Alan

11. WingMan

Posts: 263; Member since: Mar 28, 2008

It is pretty much the same length ;). EU football fields (aka soccer in the states) are between 90-120m per regulations ( 100-130 yards), US football fields are ~109m (120 yards) between goal lines.

3. Abdbaas

Posts: 156; Member since: Apr 05, 2016


6. Dr.Phil

Posts: 2488; Member since: Feb 14, 2011

I wonder if Google or Apple would purchase said vehicle to figure out how it works and stop the exploits in security from happening. I mean that’s chump change for those companies.

7. Aircrackng

Posts: 56; Member since: Jan 09, 2015

MITM attacks are not what i would consider hacking they are fairly easily performed and are actually really only spoofing, which also requires a fairly inept user to be a successful attack. Secondly i guarentee these "Top-Secret" techniques they are using are in fact Meltdown and Spectre which pretty much everybody by has heard about by now... Which is slowly being patched and newer devices are not as susceptible. Also the malware injection they are talking about involve a large amount of inherit user intervention... So unless you frequently are downloading files/trusting certificates/installing or opening questionabale content your not amongst their penetrable group. Now i agree that it is in fact useful on the 90% though.

8. gigicoaste

Posts: 463; Member since: Feb 21, 2016

sure will do among PA users and "editors". :)

10. Vokilam

Posts: 1387; Member since: Mar 15, 2018

Thank you for this info.

9. TheOracle1

Posts: 2340; Member since: May 04, 2015

The high net worth people I know use disposable feature phones for sensitive stuff. Sometimes the simplest stuff is the safest because they're overlooked these days. A face to face conversation for example.

14. sajahde22

Posts: 1; Member since: Sep 13, 2018

WE PROVIDE PROOF BEFORE PAYMENT Hack with comfort and get your job done systematically without a bridge of security alert. It’s frustrating not getting the value of your money on services paid for. If you are in need of safe exploit in hacking, make the right decision of using  PRIVATEJOSH3 at GMAIL dot COM, and keep tab on any subjects be it spouse, employees and friends information from social media, Phones, websites and erasing of certain confidential records you don’t want to be at public domain, we don’t brag about hack exploit it is what we do best. You can send text or call: +1 908 693 9476 You can send him a message on Whatsapp: +1 970 530 3783

Latest Stories

This copy is for your personal, non-commercial use only. You can order presentation-ready copies for distribution to your colleagues, clients or customers at or use the Reprints & Permissions tool that appears at the bottom of each web page. Visit for samples and additional information.
FCC OKs Cingular's purchase of AT&T Wireless