Anonymous’ ‘Hack Israel Day’ Could Impact The Entire World

Israel was recently hit by a massive cyber offensive. But unlike other attacks (APTs, criminal campaigns, etc.) to hit the nation, this one has been announced in advance.

It’s Anonymous’ annual OpIsrael attack, which has been taking place on April 7 every year since 2013. According to most Israeli researchers, the attack will fail. It won’t cause any major damage to state infrastructure or scare the Israeli public, and it definitely won’t “erase the Zionist devil from the Internet” (OpIsrael’s declared objective).

The annual operation, which generally consists of DDoS attacks, website defacement and attempts at data theft, has made Israeli users more aware of cyber risks, and acts as a sort of training day for local security companies.

The operation, which generally consists of DDoS attacks, website defacement and attempts at data theft, has had some positive effects: It has made Israeli users more aware of cyber risks, and acts as a sort of training day for local security companies. But this attack has another side, which might have a worldwide impact in the future.

The operation is organized by threat actors from mostly Muslim countries, and relies on quantity rather than quality. Highly skilled attackers who have access to advanced tools won’t waste their time on such a fruitless attack, as the only possible gain is helping spread political propaganda. Hacking is a business, and if there’s no money to be made, most cyber mercenaries aren’t interested.

OpIsrael’s organizers know this, so they try to enlist as many low-level operatives as they can to launch vast DDoS attacks against Israeli websites. But even this vector requires some technical skill, and many OpIsrael enthusiasts simply don’t have the know-how.

Sure, an individual who wants to engage in cybercrime can get the tools and training they need online, but only as long as they can a) reach the crimeware underground and b) pay up (as I’ve stated, this is a business). Even if said individual managed to install TOR and use it, they might not find the relevant crime store or be able to buy what they need.

It is true that crimeware prices are plummeting, and malware costs as little as a few dozen dollars, but this is not small change for everybody. Many of the hacktivists who want to take part in OpIsrael come from countries with weak economies — Indonesia, Malaysia, Syria, Egypt, etc. For an Indonesian activist who makes less than $750 a month, cyber training could be beyond their financial reach. And even if they had the money, they might be refused by crimeware sellers: Newcomer buyers might raise a shopkeeper’s suspicions, and be blocked or marked as possible moles. This is where OpIsrael 2016’s organizers step in.

Teach a man to fish

Unlike in previous years, #OpIsrael 2016 has a well-organized training program. It contains hacker groups dedicated to showing newcomers the ropes. Their keyword is accessibility: If a hacktivist wants to jump in, all they need to do is join the relevant Facebook groups, follow the right Twitter accounts (which are being advertised across social media) and declare their undying hatred for Israel, and they’re one of the gang. 

Sensitive attack details and advanced tools won’t be available to these new hacktivists for reasons of operational security, but they’ll receive DDoS training (available in several languages) and other necessary tools, free of charge. Interactions between newcomer hacktivists and their seasoned guides resemble those found in online support forums, but instead make use of several webchat channels and Telegram groups. Hacking lessons are given by experienced players, some of whom enjoy, celebrity status in the underground communities.

This training program solves OpIsrael’s main problem — mass recruitment. It also lets everybody who wants to get into cybercrime do so, for free.

The next cybercriminals

After this year’s OpIsrael’s dust settles, newcomer hacktivists will come away with a new, albeit very basic, skill set that will enable them to engage in cybercrime. Many DDoS attacks include an extortion element: Attackers can threaten targets with a massive DDoS attack, and launch a low-volume one just to prove their abilities. They can also pose as security researchers claiming to have identified an imminent DDoS attack, and request money in return for stopping the threat.

This is OpIsrael’s unseen effect: Thousands of people will receive professional cybercrime training, which could cause an increase in the volume of worldwide low-level attacks.

Security-focused organizations will know how to treat threats such as these, but most small businesses won’t. Many small businesses fear any disruption to their business process, especially at sensitive times (online stores on Black Friday, for example). Therefore, such businesses tend to give in to a criminal’s demands, since criminals usually won’t ask for more than a few hundred or perhaps a thousand dollars in bitcoin.

This is OpIsrael’s unseen effect: The fact that thousands of people will receive professional cybercrime training. These cybercriminals probably won’t settle for hacktivism for long, or hold their breath until 2017’s OpIsrael. Basic attack tools can easily work like gateway drugs on OpIsrael’s new graduates, who might turn to better tools and tactics and use them to threaten companies all over the world — not just in security-aware Israel.

Anonymous’ training operations could cause an increase in the volume of worldwide low-level attacks. And while these aren’t considered as dangerous as APTs, they currently comprise the lion’s share of cyber attacks and could inflict major damage on multiple industries.

Recode:

 

« CyberScape – The Growing Influence of Cyber (£)
US Cyberwar Against ISIS Begins »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Woz U

Woz U

Woz U provides best-in-class technology training for Learners, Higher-Ed and Corporations. We focus on the most in-demand occupations such as Software Development, Data Science and Cyber Security.

Cybint Solutions

Cybint Solutions

Cybint provides customized cyber education and training solutions for Higher Education, Companies and Government.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

SecureStack

SecureStack

SecureStack helps software developers find security & scalability gaps in their web applications and offers ways to fix those gaps without forcing those developers to become security experts.

Extreme Networks

Extreme Networks

Since 1996, Extreme has been pushing the boundaries of networking technology, driven by a vision of making it simpler and faster as well as more agile and secure.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

ITQ Latam

ITQ Latam

ITQ Latam are specialists in cybersecurity, in a convergent ecosystem of technological solutions in infrastructure, cloud and security networks.

Cytek

Cytek

Cytek is a leading provider of cybersecurity and HIPAA compliance for dental practices and other industries.

Box

Box

Box is the Cloud Content Management company that empowers enterprises to revolutionize how they work by securely connecting their people, information and applications.

Lighthouse IT

Lighthouse IT

At Lighthouse IT, we are focused on delivering seamless and reliable services to unlock the value of technology for your business.

Knostic

Knostic

Knostic is an early stage startup developing a risk management and governance platform designed for enterprise large language models (LLM).

SecureLake

SecureLake

SecureLake (formerly Managni) is one of the most trusted US-based IT security and infrastructure companies.