Attack On Israel’s Water Systems

Several water monitors that watch irrigation systems where not working after a recent cyber-attack hit the monitoring systems in the Jordan Valley. Specifically, water controllers for irrigating fields were damaged, as were control systems for the Galilee Sewage Corporation.

The management for both major systems have worked through the issue with the aim of bringing the systems back into full operation.

The source of the cyber attack is so far unknown, although this is not the first time that water systems in Israel have been targeted. 

Farmers in the region were warned several days prior about suspicions over an apparent planned attack. As a result of the warning some of them disconnected the remote controls for their irrigation systems and switched them to manual operation, to prevent any harm from the attack. Only those who left their systems on remote control were the ones impacted by the attack.

Israel's National Cyber Directorate had earlier warned about the increase in cyber attacks by anti-Israeli hackers throughout the month of the Islamic festival of Ramadan. 

Israeli media agencies, medical websites, government and university websites have all faced massive cyber attacks throughout the past week, including throughout the Passover holiday. These attacks are part of what is known as OPIsrael, an annual event that takes place every April with the goal of harming critical infrastructure to Israel.

Jerusalem Post:    Security Week:     Council on Foreign Relations

You Might Also Read: 

Hacktivist Group GhostSec Attack Israel:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« FBI Seizes $112m From 'CryptoRom' Criminals
Russian Hacktivists Attack Canadian Gas Pipeline »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

ACI Worldwide

ACI Worldwide

ACI Worldwide powers electronic payments for more than 5,000 organizations around the world.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Digital Law

Digital Law

Digital Law is the only UK law firm to specialise solely in online, data and cyber law.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

Noname Security

Noname Security

Noname Security detects and resolves API vulnerabilities and misconfigurations before they are exploited.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

HADESS

HADESS

We are "Hadess", a group of cyber security experts and white hat hackers.

DruvStar

DruvStar

DruvStar provides B2B cybersecurity around threat management to strengthen businesses across attack vectors.

Zyber 365 Group

Zyber 365 Group

Zyber 365 are providing a robust, decentralized, and cyber-secured operating system which adheres to the fundamental principles of environmental sustainability.

Evervault

Evervault

Evervault provides engineers easy solutions to complex data security and compliance problems.

SITS Group

SITS Group

SITS Group excel in delivering a comprehensive range of Cyber Security consulting and managed services, from cloud transformation to risk management.